A Scalable Content-Addressable Network
KONGSBERG 2022 产品介绍书说明书
CMD 202202/06/2022Geir Håøy, President & CEO KONGSBERGDISCLAIMERThis presentation contains certain forward-looking information and statements. Such forward-looking information and statements are based on the current, estimates and projections of the Company or assumptions based on information currently available to the Company. Such forward-looking information and statements reflect current views with respect to future events and are subject to risks, uncertainties and assumptions. The Company cannot give assurance to the correctness of such information and statements. These forward-looking information and statements can generally be identified by the fact that they do not relate only to historical or current facts. Forward-looking statements sometimes use terminology such as "targets", "believes", "expects", "aims", "assumes", "intends", "plans", "seeks", "will", "may", "anticipates", "would", "could", "continues", "estimate", "milestone" or other words of similar meaning and similar expressions or the negatives thereof.By their nature, forward-looking information and statements involve known and unknown risks, uncertainties and other important factors that could cause the actual results, performance or achievements of the Company to differ materially from any future results, performance or achievements that may be expressed or implied by the forward-looking information and statements in this presentation. Should one or more of these risks or uncertainties materialize, or should any underlying assumptions prove to be incorrect, the Company's actual financial condition or results of operations could differ materially from that or those described herein as anticipated, believed, estimated or expected.Any forward-looking information or statements in this presentation speak only as at the date of this presentation. Except as required by the Oslo Stock Exchange rules or applicable law, the Company does not intend, and expressly disclaims any obligation or undertaking, to publicly update, correct or revise any of the information included in this presentation, including forward-looking information and statements, whether to reflect changes in the Company's expectations with regard thereto or as a result of new information, future events, changes in conditions or circumstances or otherwise on which any statement in this presentation is based.Given the aforementioned uncertainties, prospective investors are cautioned not to place undue reliance on any of these forward-looking statementsGlobal leader in energy, maritime and renewables Best-in-class technology stackAdvancing the path towards net zeroemissions Reimagine how our people workAutomating the world’s industriesSolving complex problems acrossvalue chain in asset-heavy industries2025E2025 targets2021Next-gen digital solutions to drive growthCapitalise on two globally leading technologies to reach 2025E targetsEquivalent to ⁓5% of O&Gupstream and downstream assetsKognitwinNext-gen solution⁓13% of the relevant world fleet built 2000-2020Vessel InsightNext-gen solutionNOKmKognitwin Vessel Insight Established business845Revenue⁓2,800Revenue389ARR⁓2,700ARR⁓35%Revenue CAGRMay 20222025E1,700⁓8,000142025EMay 2022⁓110# of Digital Twins# of sold Vessel Insight vesselsCMD 2022 02/06/2022Andreas Jagtøyen, EVP Digital OceanDelivering the industrial work surfacein a scalable ecosystemVessel InsightSaaS solution for full fleet overviewNext-genEcosystem aiming to optimise the operation of ships by providing a vessel-to-cloud data infrastructure that captures and aggregates quality data in a cost-efficient and secure way The solution provides instant and easy access to fleet overview, vessel specific dashboardsand data analysis toolsMarSim (1)Advanced and dynamic simulatorsK-Sim ConnectCloud-based trainingsimulatorAdvanced simulators and models used mainly for training and educational purposes in arange of disciplinesEstablished businessModern cloud-based training simulators, enabling cloud-based training on your own device onboard ship, at home or at schoolIncumbent position in merchant, navy and offshore simulation servicesNext-gen++Key highlightsNOK 845m39%NOK ⁓1,200m in revenue ⁓8k vessels connected ⁓80% recurring revenueShare of total revenue, 20212025E targets Introduction to Digital OceanThe Maritime Digital Transformation& Our JourneyMain Market Trends &Impact on Digital OceanWe observe 3 main trends in the market...Increasing signs that the market enters growth phase significantly driving our pipeline& salestractionContinous focus on main drivers (e.g. fuel & emissions) in the market supports rollout of our application& ecosystemportfolio Increasing digital maturity & demand in several segments drives fleetrolloutWe signed fleet agreements acrossall relevant high-& low-end segmentsCurrent status of maritime digitalization (illustrative)Digitalization of high-end segments expected to drive adoption Vessel Insight Tiers & Fleet AgreementsDigitalmaturityContainerOthers⁓ 20% of marketHigh-end segments expected to be early adopters ofnext-gen digital solutions due to a higher willingnessto payOffshoreLPGLNG⁓ 80% of marketLow-end segments withbasic digitalization needsVessel Insight Connect•Automatic data collection•Full access & connectivity•Data visualization, contextualization & interpretation•Advanced applications utilizing high frequency dataVessel Insight Access•Basic connectivity•Manual data collection•Data visualization & contextualization•Standard applicationsSuccesfully signed fleet agreements in allhigh-end segments& low-end segments (Bulkers & Tankers) Total Addressable Market⁓ 64,000 vessels (YE 2022)Our application & ecosystem portfoliohelps to solve the 4 major challengesCONDITION MONITORING& ASSET MANAGEMENTEcosystem & MarketplaceABSKYMAYXNEYMaritimeOrbitMINautilusLabs…+ KDI & KM ApplicationsVesselPerformanceConditionMonitoringHealthMgmt.K-FleetLNG QualityPlanner...+CoachSolutionsCOMPLIANCE &SUPPLY CHAIN INTEGRATION VESSEL & FLEETPERFORMANCEVOYAGE PLANNING& OPTIMISATIONShort Term FocusMetisAlphaOriEarly signs that market enters growthphase driving sales traction & pipelineVI contracted vessels,existing customerportfolio⁓2,600Remaining fleet atexisting customerportfolio, not VIcontracted yetFleet size atnew customerpipelineTotal VIcontractedassets andpipeline⁓1,700⁓5,900Key TakeawaysVI ConnectVI Access⁓1,500Significant increase in contracted vessels and high untapped sales potentialSignificant growth in signed contracts in first 4 months 2022(from ⁓ 1,000 to ⁓ 1,700 vessels)Rapid increasing interest in VI Connect(high frequency data)⁓2,600Converting contracts to revenue on VI Connect(requires increased delivery capacity & access to hardware)Summary & Focus areas going forward“The collaboration with MAN Energy Solutions and KDIhas accelerated the digitalization of our vesselsoperations and is an important step in improving ouroperational efficiency . Building on the success of the pilotproject, we are pleased to continue the partnership withthe addition of four vessels in our fleet.”-Andreas Enger, CEOContinue rolling out Vessel InsightTargeting VI ready vessels and upselling to current customers entire fleetFurther scale up of the organisationFurther enhance sales and software development capabilities to accelerate growthIncreasing the competence of crew membersClosing the competence gap with cloud-based training anywhere and anytimeMove customers to higher tier levelsProvides access to more data, applications and functionalities for the customerExpanding the open ecosystemEnabling the industrial work surface for the maritime industryCMD 2022 02/06/2022Shane McArdle, EVP Digital EnergyKey highlights Share of total revenue, 20212025E targets Digital Energy31%NOK ⁓1,100m in revenue ⁓100 Digital Twins sold ⁓80% recurring revenueKognitwinDigital TwinLedaFlowMulti-phase flowassurance simulatorK-SpiceDynamic processsimulatorSolution to ensure continuousflow of molecules in anyprocessing facilityWorksurfacePowered byAdvanced process simulator forthe understanding of dynamicprocess behaviour, performancemodelling, and optimisation ofdesign and operationsThe Industrial WorksurfaceProvides an end-to-end experience with your industrial data, operations and a place toexecute your work++NOK845mMain Market Trends in Digital EnergyWe observe 3 main trends in the marketIncreasing signs that the market is adopting Digital Twins as an industry standard thus driving our pipeline& salestraction Continuous focus on energy transition, operational efficiency & digital workforce in the market supports rollout of oursolutions Increasing digital maturity & demand in the energy sector drives asset tractionfor KognitwinIndustrial WorksurfaceSingleAsseto Data Ingestiono Data Contextualisationo Data Visualisationo Workflow Orchestrationo Hybrid ML/aio Robotics / Machine vision Value reflected in individual asset multi-yearOP & WFPEfficiencyKognitwin delivers future asset capabilities and shapes the future of work for individuals and industriesTarget businessimpactDigital Twin will drive asset transformation & competitivenessOperationsMaintenanceSupply ChainManagement of changeOrganisational capabilityPlanning & SchedulingIncludes associatedprocess & personalsafety processesValue from 1 AssetFleets ofAssetsFleets of assets also enable scaled operationalexcellence learningsPortfoliointegrationKognitwin enables Integrated Clean Energy & Low Carbon Solutions through digital capabilities at scaleTarget businessimpactIntegrated activityplanningQualityGreen House GasesEnergy ManagementIncludes associatedprocess & personalsafety processesValue from “Fleets” of AssetsCollaborativeways ofworkingSafetyEnergy valuechainintegrationCentralisedoperationsHybrid analytics creating the pathtowards industrial autonomyIncreasingLevelofAutomationPeople&ProcessAdvancement in Digital Twin Technology, Use Case and Changes to Human Way of Working ▪Data Governance▪Data Modelling▪Standardized ManagementProcessesManumatic Driven ProcessesDescriptive(Current Best Practice & DTFoundation)▪API 1st Strategy▪1st Engineering Principal Models▪Analytics Driven advice▪Contextualized VisualizationAdvice DrivenPrescriptive(Co-Pilot)▪Hybrid ML Models (Always-On)▪2-way ICSS Integration▪Process Control Domain to DigitalTwin Security ModelSemi-Autonomous (I)Closed-Loop Control(Process Control Updates)▪Automated Management Processeswith human based confirmation▪Hybrid ML Models Advanced ICCSIntegration▪Early Adoption of drones forsimple/semi autonomous processesSemi-Autonomous (II)Advance Work ProcessAutomation(Process Control + Work Processes)▪Simplified Business ProcessesAdopted to high level of automation▪Asset Automation System with highlevel of data redundancy▪All Analytics Models able to bepushed to the edge▪Ariel & Ground Drones supportremote Operation Procedures▪Autonomous Operations EnabledFully AutonomousClosed-Loop Automation(North Star)Digital Twin TodaySecure scalable business model withlow threshold to adopt solutionsMarket Adoption8-10weeksDeploymenttimelineTime to valueEconomy ofscaleIndustrial SaaSSoftwareGlobal &localsupportSystemintegrationreadyTrust &relationshipLow barrier toentryHighly scalablesolutionsSaaSUsersPlatformSaaSAppsSaaStransitionAdopted across the board3rd partyapplicationsProfit sharing model High customerROI(1)DifferentiationIndustry domainknowledgeExisting customerrelationshipsModel InsightsAsset InsightsCollaborate ++Scale by usersScalebyappsScale by usersScale by usersConnectivity apprelatively inexpensiveAdd-on appsmore expensiveKONGSBERG PROPRIETARY -See Statement of Proprietary informationWORLD CLASS –Through people, technology and dedication Total addressable market in multiple adjacent industryverticalsA d j a c e n t i n d u s t r y v e r t i c a l sAdjacent industry verticals0.30.12025E >1.60.720210.22030E>3.8>8.60.70.6 1.61.23.71.31.72.0Digital Twin TAM, USDbn⁓20% CAGR2021-2030ETraditional energy T r a d i t i o n a l e n e r g yUpstream O&GMidstream O&G Downstream O&G Subsea mineralsOffshore windGreen / blue hydrogen Carbon capture & storage Integrated energy Transmission & distribution BatteriesChemicals (process manufacturing)Manufacturing Ports Other (2)Traditional energy sources continues to represent the Carefully expandingcore market for Kognitwin. We are delivering to the subseaminerals and utilities market..Expected to grow from ⁓USD 0.7bn to ⁓USD 3.7bn primarily constituting of upstream and downstream –driven by increased penetration despite aflat underlying marketTraditional energy⁓20%CAGRBatteries and Offshore wind expected to mature ahead of other sub-segments and contribute ⁓80% of 2030 market Green/blue hydrogen expected to addsignificant growth post-2030Renewable energy⁓35%CAGRChemicals, a core sub-segment, representing a ⁓USD 1.7bn market in2030 growing at ⁓25% CAGR Other attractive, non-quantified sub-segments include e.g. Machinery and Ports providing further upside potentialProcess and manufacturing⁓20%CAGR’21-’30E CAGRTraditional energy Renewable energy Process & manufacturing (focus)(3)Process & manufacturing (other)(4)Other verticals (5)Notes: (1) TAM = Total Addressable Market. Integrated energy, machinery, ports and other market sizes are not explicitly quantified and not included in the TAM, and represent further upside; (2) E.g. cement and mining; (3) Focus areas include chemicals,machinery (market not sized) and ports (market not sized) sub-segments; (4) Other non-focus areas include cement and mining sub-segments; (5) Illustrative effect of other verticals where market sizes are not explicitly quantified Sources: Company information, Tier 1 consulting firm as per November 2021KONGSBERG PROPRIETARY -See Statement of Proprietary informationWORLD CLASS –Through people, technology and dedicationThe future of energy systems is integrationLicence to operateCapital investments into greenfield projects of the future will require a carbon neutral approachCollaborating at scaleFurther enhance collaboration across increasingly complex operating assetsIndustrial WorksurfaceProvides a work surface to operate and maintain a complex fleet of assetsTwin of TwinsKognitwin is strongly positioned to provide an integrated twin for the proposed systemExpanding the energy systemIntegrating technology solutions with assets such as hydrogen, CCS (1), wind, and microgrids is likely to be one standard part of an investmentSource: Company informationKONGSBERG PROPRIETARY -See Statement of Proprietary information。
network is unreachable的解决方法
network is unreachable的解决方法全文共四篇示例,供读者参考第一篇示例:“network is unreachable”是一种常见的网络连接问题,通常意味着您的设备无法访问互联网或局域网。
这种问题可能会导致您无法浏览网页、收发邮件或与其他设备进行通信。
出现这种问题时,不要惊慌,可以尝试一些简单的解决方法来解决这个问题。
1. 检查网络连接您需要确保您的设备已正确连接到网络。
您可以检查一下网络连接是否正确连接并且运作正常,确保网络线没有损坏,并且路由器已正常工作。
有时候只需重新插拔网络线或者重启路由器就可以解决问题。
2. 检查IP地址设置如果网络连接没有问题,您可以检查一下设备的IP地址设置。
确保您的设备获取到了正确的IP地址,并且网络配置正确。
您可以尝试切换到静态IP地址或者使用自动获取IP地址的方式来解决问题。
3. 检查防火墙设置防火墙可能会阻碍您与网络的连接,导致“network isu nreachable”的问题。
您可以检查一下设备的防火墙设置,确保没有阻止网络连接的规则。
如果有必要,您可以尝试关闭防火墙来测试一下是否可以解决问题。
4. 检查DNS设置DNS是将域名解析为IP地址的服务,如果DNS设置不正确,可能会导致“network is unreachable”的问题。
您可以尝试更改DNS 设置,或者使用其他公共DNS服务,比如Google的8.8.8.8和8.8.4.4来解决问题。
5. 检查网络设备有时候是网络设备出现了问题,比如路由器、交换机或者调制解调器。
您可以尝试重新启动网络设备,或者升级固件来解决问题。
确保您的网络设备运行正常,并且没有硬件故障。
“network is unreachable”是一个比较普遍的网络连接问题,可能由多种原因引起。
不过,大多数情况下可以通过上面提到的解决方法来解决问题。
如果您尝试了以上方法仍然无法解决问题,可能需要联系网络管理员或者网络服务提供商来获取进一步的帮助。
PIER (Peer-to-Peer Information Exchange and Retrieval)课件
Internet.”
精
4
Motivation
Databases:
powerful query facilities potential to scale up to few hundred
computers
For querying Internet, there is a well distributed system that has
DHT is divided into 3 modules
Very simple interface
Storage Manager
Any routing algorithm here: CAN,
Chord, Pastry, etc.
Overlay Routing API:
lookup(key) ipaddr join(landmarkNode) leave() CALLBACK: locationMapChange()
Standard Schemas
Achieved though common software
精
10
Initial Design Assumptions
Overlay Network
DHTs are highly scalable Resilient to network failures But DHTs provided limited functionalities Design challenge: get lots of functionality from this simple
精
2
Outline
Motivation Introduction Architecture Join Algorithms Experimental Results Conclusion
CAN
结点要发起数据查询时 ,它先利用 DHT将查询数据的key映射到虚拟坐
标空间的点 P上 ,查询消息目的地址就是坐标空间中点 P的坐标 ,然后 , 结点再根据自己的路由表将查询消息发送到离 P最近的邻居上。对于
具有 N 个结点的CAN系统 ,每个结点维护 O (d) 的状态 ,每次搜索的搜
索代价是 O (dN1/d)。
2.2 CAN的构建
整个 CAN空间是由当前系统里所有的结点来 动态划分的。每当新的结点加入时 ,系统必 须为它分配相应的坐标空间。 一般的做法是:系统中某个现有的结点将自己 的区域一分为二 ,自己保留一半 ,将另一半分 配给新的结点整个过程包括: 1)新的结点必须找到一个在 CAN中已经存在 的结点; 2)通过 CAN的路由机制 ,新结点必须找到一个 区域将要被分割的结点; 3)进行区域划分操作 ,并通知被分割区域的邻 居有新的结点加入以便在邻居的坐标路由表 中包含新的结点。
2. Design
2.1 CAN的路由机制 2.2 CAN的组成
2.3结点离开 ,恢复和 CAN维护
2.1 CAN的路由机制
在 CAN中 ,每个结点都维护一张坐标路由表 ,此表用来存放该结点 所有邻居的 IP地址和虚拟坐标区。在 d维坐标空间中 ,如果两个 结点的坐标在 d - 1维上重叠而在另一维上相邻接 ,则称这两个结 点是邻居关系。对于 d维的坐标空间 ,每个结点有2d个邻居结点 , 因此每个结点的坐标路由表会维护 2d个邻居的 IP地址和坐标信 息。 对于划分成 n个同等大小的 d维坐标空间 ,每个结点维护 2d个邻 居的信息 ,这就意味着可以在不增加每个结点状态的同时增加网 络结点数 ,而平均路由长度只以 O (n1/d) 的数量级增长。而且 ,坐 标空间中两个结点之间有多条不同路径 ,如果结点的一个或更多 个邻居失效 ,结点可以自动沿着下一条可用的路径路由。
Content-Addressable-Network
CAN是由AT&T 所提出点对点搜寻算法,CAN 是利用多维坐标空间概念来建构的点对点架构。
下图即为一个包含五个节点二维坐标系统的CAN架构概念图。
如节点A 所拥有的坐标空间为(,),节点B 所用有的坐标空间为()。
接下来,我们利用下图来说明CAN 点对点建立的算法。
当一个新的节点欲加入CAN 系统时,新加入的节点会透过一个起始点(Bootstrap)随机的选择系统中的节点,并送出加入(JOIN)系统的讯息给随机选择的节点。
当被选择到的节点收到加入的讯息时,则均分其所拥有的坐标空间。
如下图所示,当节点E 加入节点D 的区域时,则D 将其所拥有坐标空间均分给E。
而在CAN 的系统中档案的储存方式是当节点欲分享新的档案加入CAN 系统时,CAN 系统会将其文件名称依照杂凑函数计算出一个坐标,并将档案信息储存在此坐标空间的节点。
当节点欲搜寻档案时,CAN 也是利用每个节点所拥有的路由表(coordinate routing table)来搜寻档案。
路由表内所储存的数据为记录在坐标空间中相邻节点的IP 地址及所拥有的空间信息。
因此,当起始点收到系统中节点要求搜寻档案的讯息时,起始点会先利用杂凑函数计算出此档案所代表的坐标,起始点会从系统中任意选择一个节点,并将搜寻档案的坐标送给被起始点所选择的节点。
被选择到的节点收到档案数据讯息时,会先查询档案数据是否存在节点中,如果存在则回报档案讯息给提出搜寻档案的节点。
如果不存在,则节点会依照节点中的路由表,依据贪婪算法(greedy algorithm)找出一个与档案坐标最接近的节点,并转送此查询讯息,依照此搜寻方式直到找到档案为止T&T ACIRI中心的CAN(Content Addressable Networks) 项目独特之处在于采用多维的标识符空间来实现分布式散列算法。
CAN将所有结点映射到一个n维的笛卡尔空间中,并为每个结点尽可能均匀的分配一块区域。
虚拟电子钱包的概述
1. 电子钱包的起源最早的电子钱包是由英国西敏寺( National- Westminster ) 银行开发的电子钱包 Mondex , 于 1995 年 7 月首先在有" 英国的硅谷" 之称的斯温顿( S windon ) 市试用, 很快在斯温顿打开局面, 被广泛应用于超级市场、酒吧、珠宝店、停车场等。
这是由于电子钱 包使用十分简单, 只要把 Mondex 卡插入终端, 三五分钟之后, 一笔交易即告结束。
Mondex 卡终端支付只是电子钱包的早期应用, 从形式上看, 它与智能卡十分相似。
而今天电子商务中的电子钱包则已完全摆脱了实物形态成为真正的虚拟钱包。
下文主要是对虚拟电子钱包进行介绍和分析。
2. 电子钱包 2.1 电子钱包的概念电子钱包(E- wallet)是一个可以由持卡人用来进行安全电子 交易和储存交易记录的软件。
它的本质是装载着电子货币的" 电 2) 通过电子商务服务器与有关商家联系, 诉顾客所购货物的单价、应付款、交货等信息。
并得到答复, 告 3) 顾客确认后, 用电子钱包付款, 将电子钱包打开, 输入自 己的用户名和密码, 确认是自己的钱包后, 取出其中的一张信用 卡来付款。
4) 购物者发送能够给商家一个完整的订单及要求 付 款 的 指令, 用哈希加密法对订单和付款指令生成" 消息摘要" , 由购物 者进行电子签名。
对信用卡号码使用银行的公钥进行加密( 商家 永 远 不 会 见 到 信 用 卡 号 码 ) , 用 商 家 的 公 钥 加 密 , 生成" 数 字 信 封" , 将其发送给商家。
5) 商 家 用 私 钥 打 开" 数 字 信 封" , 解 密 订 单 、验 证" 消 息 摘 要" 。
服务器将 S ET 加密的交易信息连同订单副本一起转发给结 算卡处理中心。
SIMPLEX 4100ESi综合型火灾探测系统说明书
4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.Australia Level3,95CoventryStreetSouthbankVIC3006Tel:1300725688Tel:+61393139700Email:*******************************SIMPLEX is a leading global brand in the fire detection industry. The SIMPLEX product line includes a wide range of AS-listed, UL-listed and FM-approved life safety products for fire detection, emergencycommunications, voice evacuation, security, and related solutions. Many other product approvals and listings are also available including Chinese, Korean, and Russian certifications. The product line is availablethrough a variety of Johnson Controls companies and SIMPLEX authorised dealers around the world.© 2017 Johnson Controls. All rights reserved. All specifications and other information shown were current as of document revision date and are subject to change without notice.Building Safety4100ESibroSFP1706 August 2017 4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.The fire detection system of choice for medium to large facilitiesWe’ve been working on the evolution of the Simplex 4100 for over 20 years, and we truly believe we have now achieved a unique and robust approach to fire detection in medium to large facilities – including tunnels, hospitals, universities, prisons, airports, shopping centres and the list goes on.Our latest development allows this model to control up to 500 zones within its core software, whileretaining the flexibility to navigate your individual and unique programming requirements. The model’s high level of technical capability equips you to perform non-standard setups by simply allocating commands to your chosen zones.At Simplex, we’re always striving to beat our personal bestOur aim to increase fire detection and safety in your facilities is why we are always improving and developing our tried and trusted products. We strive for the best and safest – and that’s a benchmark we aim to redefine.Simplex panels have always had a strong reputation for being reliable, dependable, and withstanding the test of time.With Simplex 4100ESi, we’ve raised the bar and made them even better, yet simple.Cutting edge technology torevolutionise your fire detectionThe latest addition to the Simplex family allows you to use your PC to program a basic system in two simple steps:1. Enter devices and descriptions.2. Allocate and group devices to zones. That’s it!Once programmed, enjoy fast, effective controls at the tips of your fingers. Use the intuitive colourtouchscreen to easily operate the AS 7240.2 panel and the zone disable/enable controls.The Simplex 4100ESi greatly reduces the time required for programming.We’re redefining theclassics, taking the hassle out of large fire detection requirements.Welcome to the future of fire safety technology.30000 7240 3500 2000 1000 500 99 2010Fully compliant to latest standardsUser-friendly AS7240.2-certified panel conforms to the latest Australian Standards to offer you peace of mindBetter capacity, greater connectivity2,000-point addressable device capacity – ideal for facilities of any sizeConnect up to 99 panels on a singlenetwork ring – up to 3,500 metres apart in copper, or a stunning 30,000 metres apart in single mode fibreGenerous 10A power supply – Reduces the need for extra power supplies or battery boxesIntuitive and intelligentEasy to read and navigate interactive touch-screen displayRegularly updated e-manuals, accessible on any internet-connected deviceEasier installation and upgradesThe backward compatible Simplex 4100ESi uses intuitive Windows-style programming softwareProgramming templates for common functions (including 1668 controls, day-night sensing, alarm acknowledgement, delay and investigation)Enjoy total flexibilityNon-proprietary – Y our freedom of choice to select any trained Service Company to service Simplex fire detection products Available off the shelf with expansion box options and a further three sizes on demandINTEGRATED Simplicity and ease – that’s what we’ve achieved with the Simplex 4100ESi.Backwards-forwards compatibility allows you to integrate the new system with your existing Simplex 4100 without having to commit a significant amount of time and labour to complete the transition. We aim to facilitate a fusion between your Simplex 4100 system and the improved Simplex 4100ESi, in a way that supports and enhances your processes rather than disrupts them, and increases the lifespan of your existing 4100 safety system.IDEAL The Simplex 4100ESi is the ideal flexible system for your challenging fire detectionrequirements. Our scalable programming options suit all sizes of network application. Y our panels can operate 3,500 metres apart using copper, and as far as 30,000 metres apart using single mode fibre – and you can have as many as 99 panels on a single network with up to 7 rings connectable to one TrueSite Workstation (TSW). Y our Simplex 4100ESi system comes complete with on-going advice and support for many years – and for a system that is built to last and to seamlessly evolve through backward-forward compatibility, that’s the kind of service you can rely on.INTUITIVE The extra-large touchscreen display provides an elite user interface with impeccablecontrol and monitoring capabilities at your fingertips. The easy-to-use screen allows you to view and control faults, enable and disable points and zones, isolate specific issues and run detector status and service reports. In the unlikely event of any issues with your detection system, the diagnostics features and onboard help screen allow you to pinpoint exactly what needs to be altered in order to resume full working order of your fire safety operations – without needing to close your facility.INFORMATIVE Use a network display unit (NDU) to see all zones in your network – withouthaving to add separate panels. When configured as an NDU, the Simplex 4100ESi can control up to 1000 zones. Supervise – and control – all zones from a single, cost-effective screen. Reliability and connectivity is increased thanks to the availability of several High Level Interface options such as MODBUS, BACnet and SafeLINC.INSPIRING We’ve tried it, we’ve tested it, and we’ve been guiding the evolution of the Simplex4100ESi since 1992. Y ou’ve seen what a Simplex panel can do – and now it can do even more.We’ve eliminated manual programming, shortened internal processes and created a rounded solution that can keep up with your fast-paced work environment – no matter how large your facility. In fact, the Simplex 4100ESi has a faster network response time enabling it to react quickly even in a complex orlarge network environment.4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.metres between nodes using single mode fibremetres between nodes using copper networkaddressable deviceszones can be controlled by a 4100ESi NDUzones controlled by the standard configpanels can be connected up on a single ringyears of evolution of the 4100Amp power supply as standard fitmentpart 2 standards complianceAt a Glance:“I need a time-efficient solution.”The Simplex 4100ESi is a quick and simple choice for your facility – there’s no need to account for lead-time when ordering your system, because the standard panel is ready off the shelf. And intuitive, automated programming cuts down hours of set up.“I need a powerful fire alarm panel that is easy to design.”Fully compliant to the latest AS 7240.2 standard, the Simplex 4100ESi panel is not only easy to program but also the preferred choice for many fire system designers. The ability to control up to 500 zones and connect up to 99 panels on a single network ring offers designers a less complex or contradictory experience, while achieving greater integrity in the overall design. Fire system design is now a breeze.“I need a fire detection system that works efficiently in a large facility.”The Simplex 4100ESi is great for facilities of any size – with its fast network response time, ability to connect up to 99 panels on a single network ring and ability to cover a massive distance of up to 30kmbetween panels using single mode fibre.“I need a system that is built to last.”The reliable Simplex 4100ESi is not only designed to be long-lasting and hard-working, it’s also created with lifespan in mind. Not only will the base model work hard for many years, it’s also backwards-forwards compatible – so as technology advances, so can you.“I need a versatile product that I can customise to my facility’s particular requirements now and in the future.”The Simplex 4100ESi is the most flexible Simplex panel to date. Not only is it backwards-forwards compatible, you can also configure the panel as an NDU, and control double the amount of zones – without having to add extra panels or cumbersome zone switch controls.4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.Control at your fingertipsOur high specification, technologically advancedand unique touchscreen makes managing firesafety simpler than it’s ever been.From a single screen, and at the touch of yourfingers, you can:• View and monitor all fault points, supervisorypoints and Pri2 alarms• Disable and enable points and zones• Conduct alarm tests on points and zones• Access level changes• View and upload previous alarm and faultsupervisory logs• Print and upload reports• Inspect – and respond to – servicediagnosticsOnce you’ve easily programmed the panel on aPC, everything is accessible from the panel itself– where and when you need it.Here when you need usSupporting you to make the most of your Simplexproducts is our priority. Contact our team oftechnicians during business hours to answer any andall questions you have about your Simplex 4100ESi– we’ll work step-by-step with you to resolve anyissues.Simplex Technical Support Hotline1300 552 559 (toll free)Learn with usSimplex’s dedicated training department providescomplete product training – in all major cities ofAustralia. Undertake training support to ensure youare utilising the most up-to-date information whenit comes to using our products and ensuring fireprotection.4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.4100ESiIntegrated. Ideal. Intuitive. Informative. Inspiring.Freedom of choice, power to youRemain in control: it’s not only how you upgrade your systems, but also who upgrades them. The versatile compatibility of the Simplex 4100ESi enables a simple and low-cost add-on to an existing system – and can be periodically upgraded with ease, as and when your individual requirements command such a need.Not only that, our promise to you with provision of all Simplex Fire Detection products, is to save you valuable time and money. With this in mind, we make all our fire detection systems non-proprietary, so you’re free to choose who you like for technical installation andsupport throughout the lifetime of your system. You’re not bound tous in any way. We allow you to access the best services to suit yourrequirements – and that means the best costs to suit your budget.SolutionsFor All MarketsWhy choose Simplex?• Peace of mind and exceptional product quality from industry leaders you can trust.• Our constantly evolving range of project solutions means you’re ahead of the game.• Our products are developed by the world’s most well regarded fire technology experts.•With Simplex products, costs are low, problems are solved, and lives are saved.。
Peer-To-Peer介绍最近几年,Peer-to-Peer(对等计算,简称P2P)迅速
Peer-T o-Peer 介绍最近几年,Peer-to-Peer (对等计算,简称P2P) 迅速成为计算机界关注的热门话题之一,财富杂志更将P2P列为影响Internet未来的四项科技之一。
“Peer”在英语里有“对等者”和“伙伴”的意义。
因此,从字面上,P2P可以理解为对等互联网。
国内的媒体一般将P2P翻译成“点对点”或者“端对端”,学术界则统一称为对等计算。
P2P可以定义为:网络的参与者共享他们所拥有的一部分硬件资源(处理能力、存储能力、网络连接能力、打印机等),这些共享资源通过网络提供服务和内容,能被其它对等节点(Peer)直接访问而无需经过中间实体。
在此网络中的参与者既是资源(服务和内容)提供者(Server),又是资源获取者(Client)。
客观地说,这种计算模式并不是什么新技术,自从上个世纪70年代网络产生以来就存在了,只不过当时的网络带宽和传播速度限制了这种计算模式的发展。
90年代末,随着高速互联网的普及、个人计算机计算和存储能力的提升,P2P技术重新登上历史舞台并且带来了一场技术上的革命。
许多基于P2P技术的杀手级应用应运而生,给人们的生活带来了极大的便利。
从计算模式上来说,P2P打破了传统的Client/Server (C/S)模式,在网络中的每个结点的地位都是对等的。
每个结点既充当服务器,为其他结点提供服务,同时也享用其他结点提供的服务。
P2P与C/S模式的对比如下图所示:图1 Client/Server模式图2 Peer to Peer 模式P2P技术的特点体现在以下几个方面[1]:∙非中心化:网络中的资源和服务分散在所有结点上,信息的传输和服务的实现都直接在结点之间进行,可以无需中间环节和服务器的介入,避免了可能的瓶颈。
P2P的非中心化基本特点,带来了其在可扩展性、健壮性等方面的优势。
∙可扩展性:在P2P网络中,随着用户的加入,不仅服务的需求增加了,系统整体的资源和服务能力也在同步地扩充,始终能比较容易地满足用户的需要。
HP T200色彩打印网页印刷机说明书
HP T200COLOR INKJET WEB PRESSExperience fast color and exceptional mono productivity. Impress clients with high-quality digital color, in a device that fits your business and your budget.Take your business to the next level with a solution that can increase growth and profitsGrow your business with high-impact digital colorMake a serious impact with four-color (CMYK) production printing at 1200 x 600 dpi addressable resolution. With high resolution and Original HP pigment inks and printheads, you can print high-quality text, images, and graphics with 100% variable content at full press speed.HP Bonding Agent—print on low-cost, uncoated offset media with outstanding quality and durability. This colorless liquid is applied before the other inks, and only where inks are printed, to improve optical density and pigment adhesion to the paper, to reduce strike-through, and to produce prints that are water-, smudge-, and highlighter-resistant.Broad media compatibility. This press supports a wide range of uncoated offset stock, groundwood, newsprint, and other media solutions. Supported media weights range from 40 gsm up to 250 gsm.Further improve print quality with uncoated ColorPRO papers and papers with HP high-speed coating technology. To maximize system performance, HP enables high-quality media options designed for HP pigment inks and the HP T200 Color Inkjet Web Press. See the visibly enhanced print quality of papers with ColorPRO Technology. And look to papers with HP high-speed coating technology, designed to provide the highest quality output at full press speed.Production and application flexibilityHigh performance, compact press fits centralized and distributed facilities. With an innovative duplex paper path without a turn bar, the HP T200 Color Inkjet Web Press delivers high-productivity printing in a compact size that fits your existing facility.Can integrate with your existing production environment. Built with open architecture interfaces, this press can integrate with your existing production environment including 2-up workflow, off-line, near-line, or dedicated in-line finishing equipment.Fast and flexible—supports multiple applications. Print direct mail, transaction applications,(1 books-on-demand, and newspapers with a press that’s fast and offers the flexibility you need with a 20.5-inch (520,7 mm) print width.Flexibility to do more. The HP T200 Color Inkjet Web Press offers you the flexibility to print on pre-printed, pre-perforated, and pre-punched forms, or to print 100% variable content, full-color documents on white uncoated offset stock, ColorPRO papers, and papers with HP high-speed coating technology.(1In some cases, solutions based on the HP T200 Color Inkjet Web Press platform will be available through an HP authorized reseller or systems integrator.Innovative duplex paper path delivers high quality, full-color digital printing in a compact design that fits your production environment.Experience the versatile, highly productive, full-color 20.5-inch HP T200 Color Inkjet Web PressNow you can step up to full variable color printing and gain increased productivity over a single-color printing system. HP makes printing in color easy and affordable with the HP T200 Color Inkjet Web Press. This innovative press, based on proven HP technology, is optimized for mid- and large-sized print environments. With a 20.5 inch (520,7 mm) print zone, this press fits your existing 2-up workflow and is compatible with finishing equipment common in production mail environments, short-run book production, and distributed newspaper production. Plus, you get fast duplex printing speeds up to 200 feet per minute (61 meters per minute) in color and up to 400 feet per minute (122 meters per minute) in mono—all in a reliable press with a space-efficient design that’s easy to maintain.Increase profitability with a low-risk investmentEasily upgrade from single-color to full-color printing. HP is making it easier than ever to adopt one-stepall-digital color printing. Replace your current single-color printing system with a press designed to fit your existing infrastructure—reducing the expenses required to upgrade your facility to full digital color printing. Purchase consumables as needed. With no click charges, you pay only for the ink you use, allowing you to flexibly use one machine for both single-color and full-color production.Transform your production environment with one-step all-digital color on your schedule. Streamline your production environment and reduce complexityand waste. Print short-run, on-demand books and newspapers all in one step. Print in full digital color from white stock without the carrying costs and hassles of managing work-in-process inventory.Original HP inks and long-life HP Thermal Inkjet printheads provide consistent, reliable performance. The performance and reliability of HP’s Scalable Printing Technology, as well as Original HP pigment inks used in the HP T200 Color Inkjet Web Press, have been proven in commercial installations of the HP T300 Color Inkjet Web Press.Get fast color and exceptional mono productivityMeet tight deadlines with fast color and mono speeds. Print duplex speeds up to 200 feet per minute (61 meters per minute) in full color and up to 400 feet per minute (122 meters per minute) in mono. The HP T200 Color Inkjet Web Press incorporates high-speed data processing based on HP Blade Servers and advanced, scalable electronic hardware that supports printing with 100% variable content at full press speed. Experience robust performance with a high duty cycle. With its robust design and productivity up to 50 million mono and 25 million four-color duplex pages per month, this press is built for jobs formerly sent to mono electrophotographic and color offset presses. Optimize press uptime and reduce waste. With the ability to place two columns of 5,280 nozzles spaced 1,200 per inch on each inkjet printhead, HP Scalable Printing Technology allows multiple nozzles to address each pixel. Nozzle redundancy ensures greater press uptime by delivering reliable print quality even when some nozzles fail—this reduces waste and maintains quality over long runs.More printer uptime with easy, automated quality control features. The HP T200 Color Inkjet Web Press constantly monitors print quality and makes periodic adjustments to ensure the best possible results. It also provides status reports, which help you make productionrun decisions and adjustments.Long-life HP Thermal Inkjet printheads are individually replaceable by the user with an easy snap-out/snap-in design.HP print + IT: HP SmartStream UltraPrint Server delivers scalable, high-performance printing processing for 100 percent variablecontent printing in a compact footprint.For more information, visit /go/inkjetwebpress .© 2010 Hewlett-Packard Development Company, L.P . The information contained herein is subject to change without notices. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.This is an HP Indigo digital print.4AA3-0146ENW, April 2010(2 In some cases, solutions based on the HP T200 Color Inkjet Web Press platform will be available through an HP authorized reseller or systems integrator.(3HP water-based pigment inks and the Bonding Agent for the HP T200 Color Inkjet Web Press are not classified as flammable or combustible liquids under the USDOT or international transportation regulations, and are non-flammable according to EU Council Directives 67/548/EEC of 27 June 1967 and 91/689/EEC of 12 December. These materials have been tested per U.S. Environmental Protection Agency Method 1020 and the flash point is greater than 110° C.(4 Dryer and print zone exhaust systems, along with very low levels of VOC emissions enable an improved print shop work environment. Customers should consult state and local requirements and regulations.(5 No ozone products expected based on ink composition and printing technology. The inks were tested for Hazardous Air Pollutants per U.S. Environmental Protection Agency Method 311 (testing conducted in 2008) and none were detected. HAPs are air pollutants which are not covered by ambient air quality standards but which, as defined in the Clean Air Act, may present a threat of adverse human health effects or adverse environmental effects.Technology you can count on Pursue new opportunities with a web press that enables fast, reliable, high-quality results. The HP T200 Color Inkjet Web Press uses proven HP Thermal Inkjet Technology (TIJ) and Original HP pigment inks to deliver a variety of benefits, including:• High productivity with high quality—HP TIJ technology enables compact 1,200 dpi nozzle spacing for high quality and high productivity in a cost-effective press.• Reliable performance—10,560 nozzles per printhead and nozzle redundancy provide greater uptime with dependable print quality.• Proven technology—Printheads used in the HP T200 Color Inkjet Web Press have been proven in commercial applications since 2006 across multiple HP product lines from retail photo to large-format printing and in the HP T300 Color Inkjet Web Press.• Modular design—Snap-out and snap-in only those printheads that need replacement without the time and expense of a service call. Replaced in minutes, no tools or manual adjustments are required, giving you more press uptime. • Durable results—Smudge-, water-, and highlighter-resistant prints are suitable for a variety of applications, including direct mail, transaction,(2 books, and newspapers.• Improved work environment—Water-based HP pigment inks and Bonding Agent are non-flammable and non-combustible,(3 emit very low levels of volatile organic compounds (VOCs),(4 do not produce ozone, and contain no detected hazardous air pollutants (HAPs).(5Why HP HP strives to provide you with quality solutions that are exactly right for your business. The HP T200 Color Inkjet Web Press draws on more than 25 years of HP Thermal Inkjet innovation, experience, and IT leadership. As a global IT leader and the world’s largest technology manufacturer, we are uniquely positioned to support your company’s digital production needs, every step ofthe way.。
cisco 4503e
Data SheetCisco Catalyst 4500 Series Supervisor Engine II-Plus-TS for the Cisco Catalyst 4503-E Switch and Cisco Catalyst 4503 SwitchEnterprise-Class Security and Reliability for the Medium-Sized BusinessOverviewExclusive to the Cisco® Catalyst® 4503-E and 4503 Switches chassis, the Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS (shown with a Cisco Catalyst 4503 Switch and two line cards in Figure 1) offers 64-Gbps, 48-millions of packets per second (mpps) switching with 12 ports of wire-speed 10/100/1000 802.3af Power over Ethernet (PoE) and eight wire-speed Small Form-Factor Pluggable (SFP) ports directly on the supervisor engine. These additional ports scale the maximum density of the Cisco Catalyst 4503 to 116 ports when deployed with a Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS.Optimized for small offices, the Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS (Figure 2) provides a highly flexible and scalable deployment alternative to medium-sized businesses for end-user and server connectivity.Figure 1. Cisco Catalyst 4503 Switch with Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS and Two Line CardsFigure 2. Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TSIntegrated Reliability and ServiceabilityThe Cisco Catalyst 4503 minimizes network downtime with 1+1 redundant hot-swappable power supplies, a hot-swappable fan tray with redundant fans, and hot-swappable line cards. The centralized switching architecture of the Cisco Catalyst 4500 Series Switches helps ensure consistent backplane performance, even if a line card should fail.The Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS includes a dedicated 10/100 copper RJ-45 management port located on the supervisor engine faceplate for disaster recovery. If all the flash storage devices local to the switch are corrupted or completely full, the supervisor engine can download an image from a Trivial File Transfer Protocol (TFTP) server within seconds, minimizing network disruptions.Scalable PerformanceThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS extends enterprise-class switching capacity and predictable performance to the medium-sized business. A robust 64-Gbps backplane delivers 48 mpps of forwarding throughput in hardware to support high-density gigabit to the desktop and server connections. Extensive ternary content addressable memory (TCAM) resources provide extensive capacity for concurrent wire-rate intelligent services and help enable new services quickly.Comprehensive Management for Ease of UseThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS can be managed with Cisco Network Assistant, embedded CiscoView, or the command-line interface (CLI). Cisco Network Assistant is a Web-based application that provides automated routines that perform easy setup and configuration of one or more switches. Data, voice, video, and security automated routines allow quick configuration of advanced enterprise features.Part of the Cisco Catalyst 4500 FamilyThe Supervisor Engine II-Plus-TS is the entry-level supervisor engine in the growing family of Cisco Catalyst 4500 Series Switches. There are other supervisor engines specifically for user access with Layer 2 features and supervisor engines for full Layer 3 capability for access, aggregation, and distribution functions. For a list of all Cisco Catalyst 4500 Series supervisor engines, visit:/en/US/products/hw/switches/ps4324/products_data_sheets_list.html.Table 1 compares the features of the Cisco Catalyst 4500 Series supervisor engines specifically for Layer 2 access Table 1. Cisco Catalyst Supervisor Engines for Layer 2 Access OnlyFeature Cisco Catalyst 4500 Series SupervisorEngine II-Plus-TS Cisco Catalyst 4500 SeriesSupervisor Engine II-PlusCisco Catalyst 4500 SeriesSupervisor II-Plus-10GELayer 2–4 Performance 48 mpps and 64 Gbps 48 mpps and 64 Gbps 81 mpps and 108 Gbps Multilayer Switching Basic Layer 2–4 services Basic Layer 2–4 services Basic Layer 2–4 services Enhanced Interior GatewayRouting Protocol(EIGRP),Open ShortestPath First (OSPF),Intermediate System-to-Intermediate System (IS-IS),and Border GatewayProtocol (BGP)No No NoEIGRP Stub Yes Yes YesRedundant Capable No Yes YesCPU (MHz) 266 MHz 266 MHz 667 MHzNetFlow Support No No NoIP Forwarding InformationBase (FIB) Entries32,000 32,000 32,000Chassis Support Cisco Catalyst 4503 and 4503-E Switcheschassis Cisco Catalyst 4503, 4506, 4507R,4503-E, 4506-E, 4507R-E and4507R+E Switches chassisCisco Catalyst 4503, 4506, 4507R,4503-E, 4506-E, 4507R-E and4507R+E Switches chassisQuality-of-Service (QoS) Sharing Nonblocking GigabitEthernet onlyNonblocking GigabitEthernet onlyAll portsBroadcast Suppression Software1Software2Hardware Multicast Suppression No No Hardware 802.1Q-in-801.1Q (Q-in-Q) No No In hardwareActive Redundant Supervisor Engine Uplinks No 2 Gigabit Ethernet uplinks Two 10 Gigabit Ethernet uplinksand four Gigabit Ethernet uplinks1 Hardware performance for nonblocking Gigabit Ethernet ports, and software performance for all other ports.2 Hardware performance for nonblocking Gigabit Ethernet ports, and software performance for all other ports.Feature Cisco Catalyst 4500 Series SupervisorEngine II-Plus-TS Cisco Catalyst 4500 SeriesSupervisor Engine II-PlusCisco Catalyst 4500 SeriesSupervisor II-Plus-10GESynchronous Dynamic RAM(SDRAM)256 MB 256 MB 256 MB (512 MB optional upgrade) Onboard Flash Memory 32 MB 32 MB 64 MBActive Virtual LANs(VLANs)2000 2000 2000Multicast Entries 8000 8000 8000Spanning Tree ProtocolInstances1500 1500 1500Switched Virtual Interfaces(SVIs)1000 1000 1000Internet Group ManagementProtocol (IGMP) SnoopingYes (16,000) Yes (16,000) Yes (16,000)Security/QoS HardwareEntries32,000 32,000 32,000Policers 512 egress; 512 ingress 512 egress; 512 ingress 512 egress; 512 ingressCisco Catalyst 4500 Series Supervisor Engine II-Plus-TS Features at a GlanceLayer 2 Features●Layer 2 hardware forwarding at 48 mpps●Layer 2 switch ports and VLAN trunks●IEEE 802.1Q VLAN encapsulation●Inter-Switch Link (ISL) VLAN encapsulation (excluding blocking ports on WS-X4418-GB)●Dynamic Trunking Protocol (DTP)●VLAN Trunking Protocol (VTP) and VTP domains●Support for 2048 active VLANs and 4096 VLAN IDs per switch●Spanning-tree PortFast and PortFast guard●Spanning-tree UplinkFast and BackboneFast●802.1s●802.1w●802.3ad●Spanning-tree root guard●Cisco Discovery Protocol●IGMP snooping Versions 1, 2, and 3●Cisco EtherChannel® technology, Fast EtherChannel, and Gigabit EtherChannel technology across line cards●Port Aggregation Protocol (PAgP)●Link Aggregation Control Protocol (LACP)●Unidirectional link detection (UDLD) and aggressive UDLD●Q-in-Q passthrough●Jumbo Frames (up to 9216 bytes)●Baby Giants (up to 1600 bytes)●Unidirectional Ethernet●Storm control (formally known as broadcast and multicast suppression)●Forced 10/100 autonegotiation●Web Content Communication Protocol Version 2 Layer 2 Redirect●Private VLAN (PVLAN) Promiscuous Trunk●Match class of service (CoS) for non-IPv4 traffic● L2TP●CoS mutation●Per VLAN Control Traffic InterceptLayer 3 Features●Hardware-based IP Cisco Express Forwarding routing at 48 mpps●Static IP routing●Routing Information Protocol (RIP) and RIP2●Hot Standby Router Protocol (HSRP)●IGMP Versions 1, 2, 3●IGMP filtering on access and trunk ports●IP multicast routing protocols (Protocol Independent Multicast [PIM], Source Specific Multicast [SSM],Distance Vector Multicast Routing Protocol [DVMRP])●Cisco Group Multicast Protocol server●Full Internet Control Message Protocol (ICMP) support●ICMP Router Discovery Protocol●IPv6 software switches●EIGRP stub●Virtual Router Redundancy Protocol (VRRP)Sophisticated QoS and Traffic Management●Per-port QoS configuration●Support for four queues per port in hardware●Strict priority queuing●IP differentiated service code point (DSCP) and IP Precedence●Classification and marking based on IP type of service (ToS) or DSCP●Classification and marking based on full Layer 3 and Layer 4 headers (IP only)●Input and output policing based on Layer 3 and Layer 4 headers (IP only)●Support for 512 policers on ingress and 512 policers on egress configured as aggregate or individual●Shaping and sharing output queue management●Dynamic Buffer Limiting (DBL): congestion-avoidance feature●No performance penalty for granular QoS functions●Auto-QoS CLI for voice-over-IP (VoIP) deployment●Per-port, per-VLAN QoS●Selective DBLPredictable Performance●64-Gbps switching fabric●Layer 2 hardware forwarding at 48 mpps●Layer 3 hardware-based IP Cisco Express Forwarding routing at 48 mpps●Layer 4 TCP/User Datagram Protocol (UDP) hardware-based filtering at 48 mpps●No performance penalty with advanced Layer 3 and Layer 4 services enabled●Software-based learning at a sustained rate of 500 hosts per second●Support for 32,000 MAC addresses●Support for 32,000 entries in routing table (shared between unicast and multicast)●Bandwidth aggregation up to 16 Gbps through Cisco Gigabit EtherChannel technology●Hardware-based multicast management●Hardware-based access control lists (ACLs), router ACLs (RACLs), and VLAN ACLs (VACLs) Comprehensive Management●Manageable through Cisco Network Assistant●Single console port and single IP address to manage all system features●Software configuration management, including local and remote storage●Manageable through CiscoWorks Windows network-management software on a per-port and per-switchbasis, providing a common management interface for Cisco routers, switches, and hubs●Simple Network Management Protocol (SNMP) Versions 1, 2, and 3 instrumentation, deliveringcomprehensive in-band management●CLI-based management console to provide detailed out-of-band management●Remote Monitoring (RMON) software agent to support four RMON groups (history, statistics, alarms, andevents) for enhanced traffic management, monitoring, and analysis●Support for all nine RMON groups through the use of a Cisco SwitchProbe® analyzer (Switched Port Analyzer[SPAN]) port, which permits traffic monitoring of a single port, a group of ports, or the entire switch from a single network analyzer or RMON probe●Analysis support, including ingress port, egress port, and VLAN SPAN●Layer 2 traceroute●Remote SPAN (RSPAN)●Cisco Smartports macros●SPAN ACL filtering●SPAN CPU port●Dynamic Host Configuration Protocol (DHCP) client autoconfiguration●Enhanced SNMP MIB support●HTTPS●Time Domain Reflectometry (TDR)●MAC Address Notification●Cisco Generic Online Diagnostics (GOLD)Advanced Network Security●TACACS+ and RADIUS, which help enable centralized control of the switch and restrict unauthorized usersfrom altering the configuration●Standard and extended ACLs on all ports●802.1x user authentication (with VLAN assignment, voice VLAN, port security, guest VLAN, private guestVLAN, PVLAN, and RADIUS-supplied session timeout extensions)●802.1x accounting●802.1x authentication failure●802.1x PVLAN assignment●802.1x Private Guest VLAN●802.1x RADIUS-supplied time out●NAC Layer 2 802.1x●NAC Layer 2 IP●Trusted boundary●RACLs on all ports (no performance penalty)●VACLs●Port ACLs (PACLs)●PVLANs on access and trunk ports●DHCP snooping●DHCP Option 82●DHCP Option 82 insertion●DHCP Option 82 Pass Through●Port security●Sticky port security●Secure Shell (SSH) Protocol Versions 1 and 2●VLAN Management Policy Server (VMPS) client●Unicast MAC filtering●Unicast port flood blocking●Dynamic Address Resolution Protocol (ARP) inspection●IP Source Guard●Community PVLANs●Trunk Port Security●802.1x Inaccessible Authentication Bypass●MAC Authentication Bypass●Control Plane Policing●802.1x Unidirectional Controlled Port●Voice VLAN Sticky Port Security●Secure Copy Protocol (SCP)●EtherChannel Trunk Port Security●IP Source Guard for Static Hosts●IEEE 802.1x Multidomain AuthenticationHigh Availability●HSRP●VRRP●Cisco GOLDSoftware RequirementsThe Cisco Catalyst 4503 chassis with the Cisco Catalyst 4500 Series Supervisor Engine II-Plus requires Cisco IOS Software Release 12.2(25)SG or later.The Cisco Catalyst 4503-E chassis with the Cisco Catalyst 4500 Series Supervisor Engine II-Plus requires Cisco IOS Software Release 12.2(37)SG or later.Hardware RequirementsThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS can only be used with the Cisco Catalyst 4503 or 4503-E chassis.PoE-enabled power supplies are required to support PoE on the 12 10/100/1000 supervisor engine faceplate ports3 and PoE-enabled line cards added to the Cisco Catalyst 4503.Technical SpecificationsCisco Catalyst 4500 Series Supervisor Engine II-Plus-TS Performance and Switching SpecificationsThe supervisor engine includes the following:●64-Gbps nonblocking switch fabric●48-mpps Layer 2 forwarding (hardware)●48-mpps Layer 3 and Layer 4 forwarding based on Cisco Express Forwarding (hardware)●Layers 2 through 4 hardware-based switch engine (application-specific integrated circuit [ASIC] based)●Centralized design●Unicast and multicast routing entries: 32,000●Layer 2 multicast addresses: 16,384●MAC addresses: 32,768●VLANs: 2048 active VLANs●Per-VLAN Spanning Tree (PVST+) and Per-VLAN Rapid Spanning Tree Protocol (PVRST)Traffic and Congestion ManagementThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS offers the following:●Number of queues: four per port●Type of buffers: dynamic3 Up to 160 Watts (W) maximum –48 volt (V) DC PoE can be allocated to the 12 faceplate ports in any combination (up to 15.4W maximum on a single port). PoE can be enabled on the 12 10/100/1000 faceplate ports with a 1000W or 1400W AC power supply; however, PoE-enabled line cards would require a PoE-enabled power supply.Switch Architecture SpecificationsThe switch architecture of the Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS is as follows:●Store-and-forward switching●Functionally transparent line-card architecture●Packet buffering: dynamic, 16-MB shared memory●SDRAM: 256 MB●Onboard flash memory: 32 MB●Startup configuration: onboard flash memory●CPU: 266 MHzManagementThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS offers the following management features:●CiscoWorks LAN Management Solution (LMS); includes CiscoWorks Resource Manager Essentials●Cisco Network Assistant●CiscoView●BGP4-MIB.my●BRIDGE-MIB.my* (RFC 1493)●CISCO-BULK-FILE-MIB.my●CISCO-CDP-MIB.my●CISCO-CLASS-BASED-QOS-MIB.my●CISCO-CONFIG-COPY-MIB.my●CISCO-CONFIG-MAN-MIB.my●CISCO-ENTITY-ASSET-MIB.my●CISCO-ENTITY-EXT-MIB.my●CISCO-ENTITY-FRU-CONTROL-MIB.my●CISCO-ENTITY-SENSOR-MIB.my●CISCO-ENTITY-VENDORTYPE-OID-MIB.my●CISCO-ENVMON-MIB.my●CISCO-FLASH-MIB.my●CISCO-FTP-CLIENT-MIB.my●CISCO-HSRP-MIB.my●CISCO-IETF-IP-MIB.my●CISCO-IETF-IP-FORWARD-MIB.my●CISCO-IETF-ISIS-MIB.my●CISCO-IF-EXTENSION-MIB.my●CISCO-IGMP-FILTER-MIB.my●CISCO-IMAGE-MIB.my●CISCO-IPMROUTE-MIB.my●CISCO-L2-TUNNEL-CONFIG-MIB.my●CISCO-L2L3-INTERFACE-CONFIG-MIB.my●CISCO-LAG-MIB.my●CISCO-MEMORY-POOL-MIB.my●CISCO-NDE-MIB.my●CISCO-PAGP●MIB.my●CISCO-PAE-MIB.my●CISCO-PING-MIB.my●CISCO-PORT-SECURITY-MIB.my●CISCO-PORT-STORM-CONTROL-MIB.my●CISCO-PRIVATE-VLAN-MIB.my CISCO-PROCESS-MIB.my ●CISCO-PRODUCTS-MIB.my CISCO-RF-MIB.my●CISCO-RMON-CONFIG-MIB.my CISCO-RTTMON-MIB.my ●CISCO-STP-EXTENSIONS-MIB.my CISCO-SYSLOG-MIB.my ●CISCO-VLAN-IFTABLE-RELATIONSHIP-MIB.my●CISCO-VLAN-MEMBERSHIP-MIB.my CISCO-VTP-MIB.my ●DOT3-MAU-MIB.my (RFC 3636) ENTITY-MIB.my●ETHERLIKE-MIB.my●EXPRESSION-MIB.my●HC-RMON-MIB.my●IEEE8021-PAE-MIB.my●IEEE8023-LAG-MIB.my (802.3ad)●IF-MIB.my●IGMP-MIB.my●IPMROUTE-MIB.my●NOVELL-IPX-MIB.my●NOVELL-RIPSAP-MIB.my●OLD-CISCO-TS-MIB.my●PIM-MIB.my●RFC1213-MIB.my (MIB-II)●RFC1243-MIB.my (APPLETALK MIB)●RFC1253-MIB.my (OSPF-MIB)●RMON-MIB.my (RFC 1757)●RMON2-MIB.my (RFC 2021)●SMON-MIB.my (Internet draft)●SNMP-FRAMEWORK-MIB.my (RFC 2571)●SNMP-MPD-MIB.my (RFC 2572)●SNMP-NOTIFICATION-MIB.my (RFC 2573)●SNMP-TARGET-MIB.my (RFC 2573)●SNMP-USM-MIB.my (RFC 2574)●SNMP-VACM-MIB.my (RFC 2575)●SNMPv2-MIB.my●TCP-MIB.my●UDP-MIB.my●RIP SNMP MIBIndustry StandardsThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS meets the following industry standards:●Ethernet: IEEE 802.3, 10BASE-T●Fast Ethernet: IEEE 802.3u, 100BASE-TX, 100BASE-FX●Gigabit Ethernet: IEEE 802.3z, 802.3ab●IEEE 802.3af PoE●IEEE 802.1D Spanning Tree Protocol●IEEE 802.1w rapid reconfiguration of Spanning Tree Protocol●IEEE 802.1s multiple VLAN instances of Spanning Tree Protocol●IEEE 802.3 ad LACP●IEEE 802.1p CoS prioritization●IEEE 802.1Q VLAN●IEEE 802.1x user authentication●1000BASE-SX●1000BASE-LX/LH●1000BASE-ZX●RMON I and II standardsSupported Cisco Catalyst 4500 Series Classic Line Cards●WS-X4148-FE-BD-LC: Cisco Catalyst 4500 Series Fast Ethernet Switching Module, 48-port 100BASE-BX-DSMF (LC)●WS-X4124-FX-MT: Cisco Catalyst 4000 Series Fast Ethernet Switching Module, 24-port 100BASE-FX (MT-RJ)●WS-X4148-FX-MT: Cisco Catalyst 4500 Series Fast Ethernet Switching Module, 48-port 100BASE-FXmultimode fiber (MMF) (MT-RJ)●WS-X4124-RJ45: Cisco Catalyst 4500 Series 10/100 Module, 24 ports (RJ-45)●WS-X4148-RJ: Cisco Catalyst 4500 Series 10/100 Module, 48 ports (RJ-45)●WS-X4148-RJ21: Cisco Catalyst 4500 Series 10/100 Module, 48-port telco (4 x RJ-21)●WS-X4248-RJ21V: Cisco Catalyst 4500 Series PoE 802.3af 10/100, 48 ports (RJ-21)●WS-X4224-RJ45V: Cisco Catalyst 4500 Series PoE 803.3af 10/100, 24 ports (RJ-45)●WS-X4248-RJ45V: Cisco Catalyst 4500 Series PoE 802.3af 10/100, 48 ports (RJ-45)●WS-X4248-FE-SFP-Cisco Catalyst 4500 Series Fast Ethernet Switching Module, 48-port 100BASE-X (SFP)●WS-X4232-GB-RJ: Cisco Catalyst 4500 Series 32-Port 10/100 (RJ-45), 2-Gigabit Ethernet (GBIC) module●WS-X4302-GB: Cisco Catalyst 4500 Series Gigabit Ethernet Module, 2 ports (GBIC)●WS-X4306-GB: Cisco Catalyst 4500 Series Gigabit Ethernet Module, 6 ports (GBIC)●WS-X4506-GB-T: Cisco Catalyst 4500 Series Gigabit Ethernet Module, 6 ports 10/100/1000 802.3af PoE or1000BASE-X (SFP)●WS-X4418-GB: Cisco Catalyst 4500 Series Gigabit Ethernet Module, server switching 18 ports (GBIC)●WS-X4448-GB-SFP: Cisco Catalyst 4500 Series Gigabit Ethernet Module, 48 ports 1000BASE-X (optionalSFPs)●WS-X4424-GB-RJ45: Cisco Catalyst 4500 Series 24-Port 10/100/1000 Module (RJ-45)●WS-X4448-GB-RJ45: Cisco Catalyst 4500 Series 48-Port 10/100/1000 Module (RJ-45)●WS-X4548-GB-RJ45: Cisco Catalyst 4500 Series Enhanced 48-Port 10/100/1000 Module (RJ-45)●WS-X4524-GB-RJ45V: Cisco Catalyst 4500 Series PoE 802.3af 10/100/1000, 24 ports (RJ-45)●WS-X4548-GB-RJ45V: Cisco Catalyst 4500 Series PoE 802.3af 10/100/1000, 48 ports (RJ45)Optics SupportThe eight Gigabit Ethernet SFP ports directly on the Supervisor Engine II-Plus-TS module support the following SFP media types:●GLC-T-1000BASE-T SFP●GLC-SC-MM-Gigabit Ethernet SFP, LC connector, SX transceiver●GLC-LH-SM-Gigabit Ethernet SFP, LC connector, LX/LH transceiver●GLC-ZX-SM-1000BASE-ZX SFP●Cisco coarse wavelength-division multiplexing (CWDM) SFP●Cisco dense wavelength-division multiplexing (DWDM) SFP●GLC-FE-100BX-U: FE SFP, LC connector BX-U transceiver, 10 kilometersIndicator and Port SpecificationsThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS has the following indicator and port specifications:●System status: green (operational), red (faulty)●Switch utilization load: 1 to 100 percent aggregate switching usage●Console: RJ-45●Reset (switch recessed protected)●SFP and 10/100/1000 PoE ports: link and active●Image management port: 10/100BASE-TX (RJ-45 female) data terminal equipment (DTE); green (good),orange (disabled), off (not connected)Environmental ConditionsThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS requires the following environmental conditions:●Operating temperature: 32 to 104ºF (0 to 40ºC)●Storage temperature: –40 to 167ºF (–40 to 75ºC)●Relative humidity: 10 to 90 percent, noncondensing●Operating altitude: –60 to 2000 meters (m) Regulatory Standards ComplianceThe Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS complies with the regulatory standards listed in Table 2.Table 2. Regulatory Standards Compliance DetailsSpecification StandardRegulatory Compliance CE markingSafety ●UL 60950●CAN/CSA-C22.2 No. 60950●EN 60950●IEC 60950●TS 001●AS/NZS 3260EMC ●FCC Part 15 (CFR 47) Class A●ICES-003 Class A●CISPR22 Class A●AS/NZS 3548 Class A●VCCI Class A●EN 55022●EN 55024●EN 61000-6-1●EN 50082-1●EN 61000-3-2●EN 61000-3-3●ETS 300 386Table 3 lists ordering information for the Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS.Table 3. Ordering InformationProduct Number DescriptionWS-X4013+TS(=) Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS, 12 10/100/1000 802.3af PoE, 8 SFPs, console RJ-45 (based on Cisco IOS Software)S45IPB-12231SG Cisco IOS Software for the Cisco Catalyst 4500 Series (IP Base image with EIGRP stub support)S45IPBK9-12231SG Cisco IOS Software for the Cisco Catalyst 4500 Series (IP Base image with Triple Data Encryption Standard [3DES] and EIGRP stub support)MEM-C4K-FLD64M Compact flash memory, 64-MB option, for Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TSMEM-C4K-FLD128M Compact flash memory, 128-MB option, for Cisco Catalyst Supervisor Engine II-Plus-TSWarrantyCisco Catalyst 4500 E-Series and Cisco Catalyst 4500 switches are covered by the Cisco Limited Lifetime Hardware Warranty. For more information, see this document on :/en/US/docs/general/warranty/English/LH2DEN__.html.Note: If you purchased the Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS before May 1, 2009, it is covered by the Cisco 90-Day Limited Hardware Warranty. For more information, see this document on : /en/US/docs/general/warranty/English/901DEN__.html.Cisco Technical Support Services: Extending Network Intelligence That Protects Your Network Investment NowCisco Technical Support Services help to ensure that your Cisco products operate efficiently, remain highly available, and benefit from current system software to assist you in effectively managing your network service while controlling operational costs.Cisco Technical Support Services (Table 4) provide significant benefits that go beyond what is offered under the Cisco warranty policy. Services available under a Cisco SMARTnet® Service contract that are not covered under a warranty are:●Latest software updates●Rapid replacement of hardware in next-day, 4-hour, or 2-hour dispatch options●Ongoing technical support through the Cisco Technical Assistance Center (TAC)●Registered access to /Table 4. Technical Support Services: ComponentsService Feature Overview Benefits or AdvantagesSoftware Support Offers maintenance and minor and major updates for licensed feature set. Downloading new maintenancereleases, patches, or updates of Cisco IOS Software helps to enhance and extend the useful life of Cisco devices.Through major software updates it is possible to extend the life of equipment and maximize application technologyinvestments by:●Increasing the performance of current functions●Adding new capability that, in many cases, requires no additional hardware investment●Enhancing network or application availability, reliability, and stabilityTAC Support With more than 1000 highly trained customer support engineers, 390 CCIE ®certified engineers, and access to13,000 research and development engineers, the Cisco TAC complements your in-house staff with a high level ofknowledge about voice, video, and data communications networking technology. Its sophisticated call-routingsystem quickly routes calls to the correct technology personnel. The Cisco TAC is available 24 hours a day, 365days a year. This award-winning Website provides 24-hour access to an extensive collection of online product and technology information, interactive network management and troubleshooting tools, and knowledge-transfer resources that canhelp customers reduce costs by increasing staff self-sufficiency and productivity.Advance Hardware Replacement Advance-replacement and onsite field engineer options supply fast access to replacement hardware and field resources for installing hardware, minimizing the risk of potential network downtime.Table 5 lists the benefits of Cisco Technical Support Services.Table 5. Cisco Technical Support Services: Competitive DifferentiatorsFeature Benefits or AdvantagesWorldwide Virtual Lab This extensive lab of Cisco equipment and Cisco IOS Software releases provides an invaluable engineeringresource and knowledge base for training, product information, and recreation and testing of selected networkissues to help decrease time-to-resolution.Cisco TAC Training ●Courses●Technical Calls ●Technical Forums Cisco is committed to providing customers the latest in technology support. These TAC training programs assist customers in case-avoidance as well as provide knowledge transfer of Cisco networking expertise.Cisco Live Provides a powerful suite of Internet-enabled tools with firewall-friendly features; these secure, encrypted Javaapplets can turn a simple phone call into an interactive collaboration session, allowing a customer and Cisco TACsupport engineer to work together more effectively.Global Logistics Delivers award-winning, worldwide hardware-replacement support with 650 depots, covering 120 countries, at aUS$2.3 billion investment in inventory, with 10,000 onsite field engineers.Cisco IOS Software Employs 100 discrete technologies with more than 2000 features; 400 new features are added each year. CiscoIOS Software is installed in more than 10 million devices and is running on more than 10,000 networks worldwide. Itoperates on the world’s largest IPv6 and VoIP networks and in all major service provider networks worldwide.For More InformationTo learn more about how you can take advantage of Cisco Technical Support Services, talk to your Cisco representative or visit Cisco Technical Support Services at:/en/US/products/svcs/ps3034/ps2827/serv_category_home.html.For additional information about the Cisco Catalyst 4500 Series, visit: /go/catalyst4500.For additional information about Cisco products, visit or contact:●United States and Canada: 800 553-6387●Europe: 32 2 778 4242●Australia: 612 9935 4107●Other: 408-526-7209。
Bosch B Series产品指南说明书
B :more :integratedB Series from Bosch is the most advanced control panel available for small to mid-sized applications. But it's more than just intrusion–the panel easily combines with fire, access control, IP video, and smart home automation to deliver an integrated solution that increases security and reduces complexity for both you and your customers.B :more :flexibleThe control panels are as adaptable as they are powerful. You can split the system into as many as six areas with a total of 96 points (inputs), and arm perimeters or interiors independently. To improve ease of use, configure the keypads to operate all areas or just a single area. Remotely program custom text on each keypad—choose from English, Spanish, French, or Portuguese—reducing costly service calls. The control panels provide increased protection and cost savings with special point types for monitoring safety, environmental, and high-security items.B :more :efficientBosch’s Remote Connect Cloud Service makes setting up panel communications easy for mobile app control and RPS programming. And if you have any difficulty in the field, video instructions and online training are available on Bosch’s mobile-friendly website.Remote programming and diagnostics minimize maintenance costs by allowing you to service systems over the panel’s wired or wireless IP connection, without traveling to a facility. Perform remote firmware updates for easy upgrades and tooffer feature enhancements when they are available.B :more :connectedKeep end users aware of conditions at their premises by automatically sending personal notifications of important system events via email or by text message.With the Remote Security Control app, end users can operate the control panel from any iOS or Android device. Turn the system on or off, check system status, view live video, and control outputs (such as lock/unlock doors). The app works over the panel’s cellular connection, overthe Internet, or through a local wireless network.B :more :awareView premise conditions from a remote desktop or smart phone. Bosch IP camera integration with the control panels allows video motion detection to activate points on the panel, triggering camera actions, such as sending Video snapshots via email.For enhanced capabilities, integrate the panel directly with Bosch Video Management System (BVMS) to provide a single user interface for monitoring and management of both the intrusion system and video surveillance.B :more :automatedCombine the control panel with the G100 Z-Wave Home Control Gateway, to connect Z-Wave devices—such as lighting controls, door locks, temperature sensors, and more–for home or premise automation. Use the convenient, web-based dashboard. For remote control and monitoring of your SmartHome devices use Bosch’s Remote Security Plus app.B :more :compatibleThe control panels support a full range of peripherals including the Commercial Series and Blue Line Gen2 motion sensors. Both provide excellent catch performance and falsealarm immunity.For applications where a wireless installation is desired, choose the RADION wireless platform with superior range, reliability, flexibility, and battery life. RADION allows for the most cost-effective installation and service with multipledevice enrollment options, configurations, and diagnostics.B Series applications▶Early ambush and two man rules provide flexibility to meetthe specific security requirements of banks▶Use multiple areas to partition critical zones like the ATM,vault, and office. Allow the manager to turn on the branchwhile keeping the ATM vestibule accessible▶Use the automatic re-arm feature to ensure ATM vaults aresecured after being serviced▶Monitor critical coolers and HVAC systems—reducing riskfor grocery and convenience stores▶Use Area Control for turning on/off critical areas like thepharmacy, cash office, warehouse, and overhead doors▶Use the Monitor Delay/Delay Response feature to check forpropped perimeter doors, roof latches, and high-value areas,even during disarmed periods▶Deploy an integrated solution that addresses intrusiondetection, safety, and communication needs▶Custom functions provide easy one-button systemconfigurations, such as Go to bed or Go out to the pool▶Use Iate-to-open reports to monitor children arrivinghome from school▶Use RADION wireless detectors to monitor outbuildings,such as a shed or garage▶Control access authorizations so each user can have apersonalized passcode, wireless keyfob, and credentials▶Deploy advanced detectors and sensors to protect againsta wide range of security concerns (fire, smoke, CO, break-ins,explosions, and more)▶Work with central monitoring stations to provide 24-hoursupport services for testing, monitoring, and emergencyservices response▶Program scheduled events to support day-of-week,date-of-month, and holiday schedules▶Investigate alarms in detail using an event log with storagefor up to 1,000 local and reported events▶Use programmable authority levels with restricted privilegesto provide service, security, and cleaning personnel withfull or limited access▶Use flexible area configurations to protect sensitive zonesfrom access while allowing workers the flexibility to entercommon areas during off hoursKeypad models and optionsChoose from a wide range of keypads.Point and output expansionHardware and wireless expansion options include the B208/B308 Octo-input/output modules and RADION wireless technology. Expansion modules can be mounted up to 1,000 feet away from the panel for added installation flexibility.Any combination of hardwire, addressable and wirelessexpansion is possible to meet application requirements.The control panels integrate commercial intrusion, video, access, home automation, and residential fire providing one simple user interface for all systems. The scalable panels are available with 16 to 96 points and support for up to 100 users for small to mid-sized applications.SystemOverview。
DHT_6
Flooded queries (Gnutella)
N1 N2 N3
Lookup(“title”) Client
N1 N2 DB N9 N7
N3
Client Lookup(“title”) Publisher@N 4 Key=“title” Value=MP3 data…
DHTs: Problems (cont’d)
• Problem 2 (size): all nodes must be known to insert or lookup data – Works with small and static server populations
• Solution: use consistent hashing
N8
Hard to keep the Hard to keep the data in the server data in the server updated updated Simple, but O(N) state and a single point of failure
N6
N6
N7
N8
• Give responsibilities to joining nodes • Redistribute responsibilities from leaving nodes
0 lookup (key) → position lookup (key) → position insert (key, data) insert (key, data) 1 2 ... N-1 node
chp11IPV6_11.1IPv6特征及地址
IPv6高级特性(IPv6 Advanced Features)
庞大地址空间(Larger address space)
• 全球可达和灵活性(Global reachability and flexibility) • 聚合( Aggregation ) • 自动配置( Autoconfiguration ) • 即插即用( Plug-and-play ) • 端到端特性 ( End to end without NAT ) • 重新编址( Renumbering )
Examples: – 2031:0000:130F:0000:0000:09C0:876A:130B – 2031:0:130f::9c0:876a:130b – 2031::130f::9c0:876a:130b—incorrect – FF01:0:0:0:0:0:0:1 FF01::1 – 0:0:0:0:0:0:0:1 ::1 – 0:0:0 and Efficient Header)
• 基于64位处理和更少的字段 (64-bit aligned fields and fewer fields) • 基于硬件的高效处理( Hardware-based, efficient processing ) • 提高了路由的效率和性能( Improved routing efficiency and
14
IPv6 地址类型(IPv6 Address Types)
• 单播(Unicast) – 单个接口地址(Address is for a single interface.)
• 组播(Multicast) – 一对多(One-to-many)
• 任意播(Anycast) – 一到最近(One-to-nearest) – 多个设备使用相同的地址(Multiple devices share the same address.) – 路由器确定到达目的地的最近设备(Routers decide on closest device to reach that destination.) – 适合负载分担(Suitable for load balancing.)
IVC Relay Server软件简介说明书
IVC’s Relay Server software is the camera management and control center of our video system. This enterprise application allows for afull range of IP camera control and viewing over a LAN, WAN, VPN or the Internet. Live and prerecorded video can be viewed and controlled from virtually anywhere. Tools are provided to create named preset positions and panorama controls for PTZ cameras.This enterprise-class software isfully scalable, capable of supporting It is browser-based and provides API’s and ActiveX controls to integrate video into SCADA and other applications.The Relay Server software is usedto define and manage networkedIP cameras as well as system-wide attributes like the server IP address, storage space available and frame rates stored. Access to camerasand system functions are controlled through privileges and priorities assigned to each user by the system administrator.Robust IP video management softwareThe Video Solutions Leader | Visit for more product informationSingle camera view with panorama PTZ controlMultiple live view optionsEasy access to recorded video and snapshots Key Features:• Quick start configuration• Remote viewing of live and stored video • Remote control of PTZ cameras • Single point & click PTZ movement with panoramas• Configurable button controls • Named presets • Bandwidth control • Storage management • Slaved PTZ controls•APIs to integrate video and controls into SCADA HMI• Integrated text-messaging systemThe Relay Server provides system administrators with a variety of tools to remotely manage a large network of IP video cameras.• Create privilege groups and users • Configure connected cameras • Create presets for PTZ cameras • Create panoramas for PTZ cameras • Define storage parameters • Create custom buttons •Move PTZ cameras• Take snapshots from cameras • Record video clips from cameras • Display saved snapshots • Play back recorded video• Manage archived video and snapshot files •Define bandwidth management parametersIndustrial Video & Control | | 617.467.3059access to video from security cameras but have lower priority access to cameras that are being used for process monitoring. For the latter case, plant or equipment operators might have high priority access to these cameras.Management may want casual access to the video system wide, while you may want to restrict other users to specific cameras. IVC’s Relay Server includes a flexible, configurable user management system that can handle these and other scenarios.Define Privilege GroupsOperatorsManagersAdministrators• Assign access rights to cameras • Assign camera control & viewing rights • Assign administrative rights•Use or modify pre-defined groups or create your own• Create as many hierarchical groups as neededDefine User Accounts• Assign user to privilege group • Provide user login• Assign normal and override priorities • Create as many users as needed •Create users as individuals or functionsJohnNight Shift SupervisorDrillerComprehensive Video Review T oolsForensic analysis of recorded video is a key function of most video surveillance and monitoring systems. IVC’s RelayServer includes tools to make this process more productive and easier to manage.Frame bookmarking and project management Synchronized multi-segment replayordering informationSCADA HMI with integrated video & camera controlssystem requirementsT ypical requirements for a 24-camera system:CPU Intel i7 or higherRAM 8 Gbytes DDR memory or higher HDD* 2 Tbytes*Ethernet 10/100/1000Base-TX Video Card AGP card w/ 1 GBytes RAM Operating System**Windows 10 Professional/Windows Server 2019***Video storage needs vary depending on video resolution, frame rate, length of recording time, and redundancy requirements. Contact your local IVC representative to determine your specific requirements.To simplify your installation, IVC offers computers pre-configured with the appropriate Relay Server Software. Ask your IVC representative about this option.Part Number DescriptionRSS-4001Provides single IP access and control for one IP addressable camera.RSS-4004Provides single IP access and control for up to four IP addressable cameras.RSS-4008Provides single IP access and control for up to eight IP addressable cameras.RSS-4016Provides single IP access and control for up to 16 IP addressable cameras.。
addnetworkinterceptor 自定义 -回复
addnetworkinterceptor 自定义-回复什么是自定义网络拦截器(addNetworkInterceptor)?在Android开发中,自定义网络拦截器(addNetworkInterceptor)是一种用于修改和观察网络请求和响应的强大工具。
它允许开发者向OkHttp客户端添加自定义的拦截器来拦截网络请求和响应,并对其进行修改或进行其他操作。
自定义网络拦截器能够提供更高级且定制化的功能,使开发者能够更好地控制应用的网络通信。
接下来,我将从以下几个方面逐步回答关于自定义网络拦截器的问题。
1. 为什么需要自定义网络拦截器?自定义网络拦截器提供了更为灵活和强大的功能来处理网络请求和响应。
一些常见的使用场景包括:- 调试和日志记录:拦截器可以记录网络请求和响应的详细信息,方便开发者进行调试和排查问题。
- 请求和响应修改:拦截器可以修改请求和响应的内容,例如添加、删除或修改请求头、请求体、响应头等。
- 缓存和持久化:拦截器可以实现网络数据的缓存和持久化,提高应用的性能和用户体验。
- 身份验证和安全性:拦截器能够实施身份验证和安全措施,确保网络请求的合法性和安全性。
2. 如何自定义网络拦截器?在使用OkHttp进行网络请求时,可以通过向OkHttp客户端添加自定义拦截器来实现自定义网络拦截器的功能。
具体步骤如下:步骤1:创建一个实现了Interceptor接口的自定义拦截器类。
Interceptor 接口中有一个方法`intercept(Chain chain)`,用于处理请求和响应。
开发者可以在该方法中对请求进行操作,并返回修改后的请求。
javapublic class CustomInterceptor implements Interceptor { @Overridepublic Response intercept(Chain chain) throws IOException { Request request = chain.request();对请求进行操作...返回修改后的请求return chain.proceed(request);}步骤2:创建OkHttp客户端,并向其添加自定义拦截器。
Unit+5+Computer+Network中职计算机专业英语北理工版
constitute a network. Therefore, some works state that a network
requires three connected computers. One source states that a computer
network is “a network of data processing nodes that are interconnected
for the purpose of data communication”. The term “network” is defined
in the same document as “an interconnection of three or more
communicating entities. ”A computer connected to a non-computing
3. By Connection Method
Computer networks may be classified according to the technology that is used to connect the individual devices in the network such as HomePNA, power line communication, Ethernet, or wireless LAN.
(中职)计算机专业英语unit 5教学课 件
Unit 5 Computer Network
5. 1 Computer Network Basics 5. 2 Computer Network Security word Phrases Grammar Reference Translation
论文笔记:《PortLand A Scalable Fault-Tolerant Layer 2 Data
《PortLand: A Scalable Fault-Tolerant Layer 2 DataCenter Network Fabric》摘要:本文考虑了可扩展、易管理、容错并且高效的数据中心网络架构的需求。
趋于多核心处理器、终端主机虚拟化,可扩展的趋势满足指向了未来单站点与成百万的虚拟终端结点的数据中心。
存在于2层与3层网络协议面临着一些组合的限制,如缺少可扩展性,管理困难,通讯不灵活,或缺少了虚拟主机迁移的支持。
在某些程度上,当试图去支持任意拓扑时这些限制可能源于以太网IP风格协议。
我们观察到数据中心网络常常管理为,用已知的基准拓扑和增长模型的单逻辑站点架构。
根据此观察,我们设计并实现Portland,这种数据中心环境中可扩展容错的2层路由与转发协议。
通过我们的实现和评估,显示Portland 具有支持“即插即用”大规模数据中心网络的有力。
简介:本文中,作者提出了Portland,一种以太网兼容的路由、转发和地址解析协议,以满足可扩展、易管理、容错并且高效的数据中心网络架构的需求。
利用多根树和物理上的冗余互联,Portland采用了一种轻量级的协议使得交换机能够发现它们在拓扑中自己的位置。
进一步的是,Portland为所有的终端主机分配了内部虚MAC(Pseudo MAC:PMAC)地址来编码它们在拓扑中的位置。
PMAC地址使得交换机工作是高效的,并不存在转发环路。
研究内容和研究方法评论:对于迁移应用、计算和存储到散布于整个Internet数据中心中,这具有上升的趋势。
这种规模扩大的也带来运行在成千上万服务器上万兆级的数据中心已可以承载这些应用。
在未来,一大部分的Internet通讯主要发生在数据中心网络内。
它们是高度工程化,具有大量共同的设计元素。
并且,运行于数据中心网络的路由、转发和管理协议是为局域网设计的,随着规模的增加这也被证明是不充分的。
考虑对未来需求的一些推测:R1: 任意的虚拟机可以迁移到任意的物理主机,迁移的虚拟机不必修改他们的IP地址,不然就可能切断已存在的TCP链接和应用级的状态R2: 在部署前,管理员不必去配置任何的交换机。
FortiGate 80F系列产品说明书
The FortiGate 80F series provides an application-centric, scalable and secure SD-WANcompact fanless desktop form factor for enterprise branch offices and mid-sized businesses. Protects against cyber threats with system-on-a-chip acceleration and industry-leading secure SD-WAN in a simple, affordable, and easy to deploy solution. Fortinet’s Security-Driven Networking approach provides tight integration of the network to the new generation of security.Security§Identifies thousands of applications inside network traffic for deep inspection and granular policy enforcement§Protects against malware, exploits, and malicious websites in both encrypted and non-encrypted traffic§Prevents and detects against known attacks using continuous threat intelligence from AI-powered FortiGuard Labs security services§Proactively blocks unknown sophisticated attacks in real-time with the Fortinet Security Fabric integrated AI-poweredFortiSandboxPerformance§Engineered for Innovation using Fortinet’s purpose-built security processors (SPU) to deliver the industry’s best threat protection performance and ultra-low latency§Provides industry-leading performance and protection for SSL encrypted traffic including the first firewall vendor to provideTLS 1.3 deep inspectionCertification§Independently tested and validated best security effectiveness and performance§Received unparalleled third-party certifications from NSS Labs, ICSA, Virus Bulletin, and AV Comparatives Networking§Dynamic Path Selection over any WAN transport to provide better application experience based on self-healing SD-WAN capabilities§Advanced routing, Scalable VPN, multi-cast and IPV4/IPV6 forwarding powered by purpose-built network processors Management§SD-WAN Orchestration provides intuitive and simplified work-flow for centralized management and provisioning of business policies in a few easy clicks§Expedited deployment with Zero touch provisioning well-suited for large and distributed infrastructure§Automated VPN tunnels for flexible hub-to-spoke and full-mesh deployment at scale to provide bandwidth aggregation andencrypted WAN paths§Predefined compliance checklists analyze the deployment and highlight best practices to improve the overall security posture Security Fabric§Enables Fortinet and Fabric-ready partners’ products to provide broader visibility, integrated end-to-end detection, threatintelligence sharing, and automated remediation§Automatically builds Network Topology visualizations which discover IoT devices and provide complete visibility into Fortinet and Fabric-ready partner productsFirewall IPS NGFW Threat Protection Interfaces10 Gbps 1.4 Gbps 1 Gbps900 Mbps Multiple GE RJ45 | Variants with internal storageand LAN BypassRefer to the specifications table for detailsoDATA SHEET | FortiGate® 80F SeriesDeploymentNext Generation Firewall (NGFW)§Reduce the complexity and maximize your ROI by integratingthreat protection security capabilities into a single high-performance network security appliance, powered by Fortinet’sSecurity Processing Unit (SPU)§Full visibility into users, devices, applications across the entireattack surface and consistent security policy enforcementirrespective of asset location§Protect against network exploitable vulnerabilities with industry-validated IPS that offers low latency and optimized networkperformance§Automatically block threats on decrypted traffic using theIndustry’s highest SSL inspection performance, includingthe latest TLS 1.3 standard with mandated ciphers§Proactively block newly discovered sophisticated attacks inreal-time with AI-powered FortiGuard Labs and advanced threatprotection services included in the Fortinet Security FabricSecure SD-WAN§Consistent business application performance with accuratedetection, dynamic WAN path steering on any best-performingWAN transport§Accelerated Multi-cloud access for faster SaaS adoption withcloud-on-ramp§Self-healing networks with WAN edge high availability, sub-second traffic switchover-based and real-time bandwidthcompute-based traffic steering§Automated Overlay tunnels provides encryption and abstractsphysical hybrid WAN making it simple to manage§Simplified and intuitive workflow with SD-WAN Orchestrator formanagement and zero touch deployment§Enhanced analytics both real-time and historical providesvisibility into network performance and identify anomalies§Strong security posture with next generation firewall and real-time threat protectionFortiGate 80F deployment in Enterprise Branch(Secure SD-WAN)ENTERPRISET u nn e ls►Secure AccessSwitch◄MDATA SHEET | FortiGate 80F Series3HardwarePowered by Purpose-built Secure SD-WAN ASIC SOC4§Combines a RISC-based CPU with Fortinet’s proprietary Security Processing Unit (SPU) content and network processors for unmatched performance§Delivers industry’s fastest application identification and steering for efficient business operations§Accelerates IPsec VPN performance for best user experience on direct internet access§Enables best of breed NGFW Security and Deep SSL Inspection with high performance§Extends security to access layer to enable SD-Branch transformation with accelerated and integrated switch and access point connectivityBypass WAN/LAN ModeThe FortiGate-80F-Bypass offers a pair of bypass port pair that helps organizations to avoid network communication interruption due to device faults and improve network reliability3G/4G WAN ConnectivityThe FortiGate 80F Series includes a 3.0 USB port that allows you to plug in a compatible third-party 3G/4G USB modem, providing additional WAN connectivity or a redundant link for maximum reliability.Compact and Reliable Form FactorDesigned for small environments, you can place it on a desktop or wall-mount it. It is small, lightweight yet highly reliable with superior MTBF (Mean Time Between Failure), minimizing the chance of a network disruption.Interfaces1. 2x GE RJ45/SFP Shared Media Ports2. 1x Bypass GE RJ45 Port Pair (WAN1 & Port1, default configuration)*3. 8x GE RJ45 PortsFortiGate 80F/80F-Bypass/81F*80F-Bypass model onlyDATA SHEET | FortiGate ® 80F Series4Fortinet Security FabricFortiOSFortiGates are the foundation of the Fortinet Security Fabric—the core is FortiOS. All security and networking capabilities across the entire FortiGate platform are controlled with one intuitive operating system. FortiOS reduces complexity, costs, and response times by truly consolidating next-generation security products and services into one platform.§A truly consolidated platform with a single OS and pane-of-glass for across the entire digital attack surface.§Industry-leading protection: NSS Labs Recommended, VB100, AV Comparatives, and ICSA validated security and performance. §Leverage the latest technologies such as deception-based security.§Control thousands of applications, block the latest exploits, and filter web traffic based on millions of real-time URL ratings in addition to true TLS 1.3 support.§Automatically prevent, detect, and mitigate advanced attacks within minutes with an integrated AI-driven security and advanced threat protection.§Improve and unify the user experience with innovative SD-WAN capabilities with the ability to detect, contain, and isolate threats with automated segmentation.§Utilize SPU hardware acceleration to boost network security performance.Security FabricThe Security Fabric is the cybersecurity platform that enables digital innovations. It delivers broad visibility of the entire attack surface to better manage risk. Its unified and integrated solution reduces the complexity of supporting multiple-point products, while automated workflows increase operational speeds and reduce response times across the Fortinet deployment ecosystem. The Fortinet Security Fabric overs the following key areas under a single management center:§Security-Driven Networking that secures, accelerates, and unifies the network and user experience§Zero Trust Network Access that identifies and secures users and devices in real-time, on and off of the network§Dynamic Cloud Security that protects and controls cloud infrastructures and applications§AI-Driven Security Operations that automatically prevents, detects, isolates, and responds to cyber threatsServicesFortiGuard ™Security ServicesFortiGuard Labs offer real-time intelligence on the threat landscape, delivering comprehensive security updates across the full range of Fortinet’s solutions. Comprised of security threat researchers, engineers, and forensic specialists, the team collaborates with the world’s leading threat monitoring organizations and other network and security vendors, as well as law enforcement agencies.For more information, please refer to /fortiguard and /forticareFortiCare ™Support ServicesOur FortiCare customer support team provides global technical support for all Fortinet products. With support staff in the Americas, Europe, Middle East, and Asia, FortiCare offers services to meet the needs of enterprises of all sizes.DATA SHEET | FortiGate 80F Series5SpecificationsHeight x Width x Length (mm)38.5 x 216 x 160Weight 1.1 lbs (2.4 kg)Form FactorDesktop/Wall Mount/Rack TrayNote: All performance values are “up to” and vary depending on system configuration. 1. IPsec VPN performance test uses AES256-SHA256.2. IPS (Enterprise Mix), Application Control, NGFW, and Threat Protection are measured with Logging enabled.3. SSL Inspection performance values use an average of HTTPS sessions of different cipher suites.4. NGFW performance is measured with Firewall, IPS, and Application Control enabled.5. Threat Protection performance is measured with Firewall, IPS, Application Control, URL filtering, and Malware Protection with sandboxing enabledDATA SHEET | FortiGate® 80F SeriesSpecificationsOrder Information1 GE SFP SX Transceiver Module FN-TRAN-SX 1 GE SFP SX transceiver module for all systems with SFP and SFP/SFP+ slots.1 GE SFP LX Transceiver Module FN-TRAN-LX 1 GE SFP LX transceiver module for all systems with SFP and SFP/SFP+ slots.Operating Environment and CertificationsInput Rating Dual power 12Vdc, 3APower Required Powered by 2 External DC Power Adapters, 100–240V AC, 50/60 HzPower Consumption (Average / Maximum)12.6W / 15.4W12.6W / 15.4W13.5W / 16.5WHeat Dissipation52.55 BTU/h52.55 BTU/h56.30 BTU/h Operating Temperature32–104°F (0–40°C)Storage Temperature-31–158°F (-35–70°C)Humidity10–90% non-condensingNoise Level Fanless 0 dBAOperating Altitude Up to 7,400 ft (2,250 m)Compliance FCC, ICES, CE, RCM, VCCI, BSMI, UL/cUL, CBCertifications ICSA Labs: Firewall, IPsec, IPS, Antivirus, SSL-VPNBundlesFortiGuardBundleFortiGuard Labs delivers anumber of security intelligenceservices to augment theFortiGate firewall platform.You can easily optimize theprotection capabilities of yourFortiGate with one of theseFortiGuard Bundles.Bundles360ProtectionEnterpriseProtectionUnified ThreatProtectionThreatProtection FortiCare ASE 124x724x724x7FortiGuard App Control Service••••FortiGuard IPS Service••••FortiGuard Advanced Malware Protection (AMP) — Antivirus, Mobile Malware,Botnet, CDR, Virus Outbreak Protection and FortiSandbox Cloud Service••••FortiGuard Web Filtering Service•••FortiGuard Antispam Service•••FortiGuard Security Rating Service••FortiGuard Industrial Service••FortiGuard IoT Detection Service 2••FortiConverter Service••IPAM Cloud 2•SD-WAN Orchestrator Entitlement 2•。
DHT网络行为测量方法研究与实现的开题报告
DHT网络行为测量方法研究与实现的开题报告一、选题背景DHT(分布式哈希表)被广泛应用于P2P网络中,它是一种分布式的数据存储结构,可以高效地处理海量数据。
DHT网络具有去中心化、自治性、可扩展性等优点,使得P2P网络能够快速地进行资源共享。
然而,由于DHT网络协议的去中心化特性,其行为变得更加复杂,并且难以对网络进行有效的管理和监测。
二、选题意义DHT网络的恶意行为及其影响已成为当前P2P研究领域的热点之一。
许多DHT协议的研究表明:一些Peer对网络维护和资源共享的影响是非常负面的,这就要求我们对DHT网络进行深入的研究,以便更好地理解和优化DHT网络的行为。
三、研究内容和目标本研究的主要内容是针对DHT网络的行为进行测量。
在测量DHT行为时,将通过与数据交互、节点连接等活动相关的信息来分析网络的状态,并绘制出网络拓扑结构、分析节点位置分布、测量连通性、探索节点运行时间等指标。
本研究的目标是开发一种有效的方法来测量DHT网络行为,并为DHT网络的管理和安全提供数据支持。
四、研究方法和技术路线本研究将综合利用数据挖掘、机器学习和网络分析等多种技术,通过分析DHT网络的数据流和网络拓扑结构,深入研究DHT网络的行为。
同时,将开发DHT数据采集、分析和可视化工具集,以实现对DHT网络的建模和监测。
五、预期成果和应用前景本研究的预期成果包括:提供一种有效的DHT网络行为测量方法,开发DHT行为采集工具、分析工具和可视化工具,推动计算机网络研究领域的发展,并为P2P网络管理和安全提供参考。
六、工作计划和进度安排1)对目前DHT网络行为测量方法进行深入调研,形成调研报告2)开发DHT数据采集工具,实现数据采集和存储3)开发DHT行为分析工具,实现DHT网络行为数据的挖掘和分析4)开发DHT数据可视化工具,为用户提供可视化操作5)综合上述工具,开展DHT网络行为测量实验,得出实验数据,进行数据分析和结果总结6)撰写毕业论文。
C-Chord:一种改进的Chord路由算法
C-Chord:一种改进的Chord路由算法祝华平;李蜀瑜【摘要】Chord is a typical resource lookup routing protocol with load balancing,scalability and flexibility,widely used in P2P systems, but search efficiency is not good. To improve search efficiency,an improved multi-level C-Chord routing algorithm is proposed,through the multilayer cluster structure organization,optimize the routing table,and then improve resource query process,finally combined with an effective safeguard mechanism,the query efficiency can be improved. Simulation results show that this improved Chord routing algorithm is significantly more efficient than traditional Chord algorithm. And C-Chord routing algorithm can be extended to the traditional P2P systems to adapt to the large-scale distributed systems,with better stability and robustness of the network.%Chord是一种典型的资源查找路由协议,具有负载均衡、可扩展性和灵活性等特点,广泛应用于P2P系统,但查找效率并不高。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A Scalable Content-Addressable Network Sylvia Ratnasamy Paul Francis Mark Handley Richard KarpScott ShenkerDept.of Electrical Eng.&Comp.Sci.ACIRIUniversity of California,Berkeley AT&T Center for Internet Research at ICSIBerkeley,CA,USA Berkeley,CA,USAABSTRACTHash tables–which map“keys”onto“values”–are an essential building block in modern software systems.We believe a similar functionality would be equally valuable to large distributed systems.In this paper,we intro-duce the concept of a Content-Addressable Network(CAN)as a distributed infrastructure that provides hash table-like functionality on Internet-like scales.The CAN is scalable,fault-tolerant and completely self-organizing, and we demonstrate its scalability,robustness and low-latency properties through simulation.1.INTRODUCTIONA hash table is a data structure that efficiently maps“keys”onto “values”and serves as a core building block in the implementa-tion of software systems.We conjecture that many large-scale dis-tributed systems could likewise benefit from hash table functional-ity.We use the term Content-Addressable Network(CAN)to de-scribe such a distributed,Internet-scale,hash table.Perhaps the best example of current Internet systems that could potentially be improved by a CAN are the recently introduced peer-to-peerfile sharing systems such as Napster[14]and Gnutella[6]. In these systems,files are stored at the end user machines(peers) rather than at a central server and,as opposed to the traditional client-server model,files are transferred directly between peers. These peer-to-peer systems have become quite popular.Napster was introduced in mid-1999and,as of December2000,the soft-ware has been down-loaded by50million users,making it the fastest growing application on the Web.Newfile sharing systems such as Scour,FreeNet,Ohaha,Jungle Monkey,and MojoNation have all been introduced within the last year.While there remains some(quite justified)skepticism about the business potential of thesefile sharing systems,we believe their rapid and wide-spread deployment suggests that there are impor-tant advantages to peer-to-peer systems.Peer-to-peer designs har-ness huge amounts of resources-the content advertised through Napster has been observed to exceed7TB of storage on a single day,1without requiring centralized planning or huge investments in Private communication with Yin Zhang and Vern Paxson Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.SIGCOMM’01,August27-31,2001,San Diego,California,USA.. Copyright2001ACM1-58113-411-8/01/0008...$5.00.hardware,bandwidth,or rack space.As such,peer-to-peerfile shar-ing may lead to new content distribution models for applications such as software distribution,file sharing,and static web content delivery.Unfortunately,most of the current peer-to-peer designs are not scalable.For example,in Napster a central server stores the in-dex of all thefiles available within the Napster user community. To retrieve afile,a user queries this central server using the de-siredfile’s well known name and obtains the IP address of a user machine storing the requestedfile.Thefile is then down-loaded di-rectly from this user machine.Thus,although Napster uses a peer-to-peer communication model for the actualfile transfer,the pro-cess of locating afile is still very much centralized.This makes it both expensive(to scale the central directory)and vulnerable(since there is a single point of failure).Gnutella goes a step further and de-centralizes thefile location process as ers in a Gnutella network self-organize into an application-level mesh on which re-quests for afile areflooded with a certain scope.Flooding on every request is clearly not scalable[7]and,because theflooding has to be curtailed at some point,may fail tofind content that is actu-ally in the system.We started our investigation with the question: could one make a scalable peer-to-peerfile distribution system?We soon recognized that central to any peer-to-peer system is the in-dexing scheme used to mapfile names(whether well known or dis-covered through some external mechanism)to their location in the system.That is,the peer-to-peerfile transfer process is inherently scalable,but the hard part isfinding the peer from whom to retrieve thefile.Thus,a scalable peer-to-peer system requires,at the very least,a scalable indexing mechanism.We call such indexing sys-tems Content-Addressable Networks and,in this paper,propose a particular CAN design.However,the applicability of CANs is not limited to peer-to-peer systems.CANs could also be used in large scale storage management systems such as OceanStore[10],Farsite[1],and Publius[13].These systems all require efficient insertion and re-trieval of content in a large distributed storage infrastructure;a scal-able indexing mechanism is an essential component of such an in-frastructure.In fact,as we discuss in Section5,the OceanStore system already includes a CAN in its core design(although the OceanStore CAN,based on Plaxton’s algorithm[15],is somewhat different from what we propose here).Another potential application for CANs is in the construction of wide-area name resolution services that(unlike the DNS)decou-ple the naming scheme from the name resolution process thereby enabling arbitrary,location-independent naming schemes.Our interest in CANs is based on the belief that a hash table-like abstraction would give Internet system developers a powerful design tool that could enable new applications and communicationmodels.However,in this paper our focus is not on the use of CANs but on their design.In[17],we describe,in some detail,one possi-ble application,which we call a“grass-roots”content distribution system,that leverages our CAN work.As we have said,CANs resemble a hash table;the basic oper-ations performed on a CAN are the insertion,lookup and deletion of(key,value)pairs.In our design,the CAN is composed of many individual nodes.Each CAN node stores a chunk(called a zone)of the entire hash table.In addition,a node holds information about a small number of“adjacent”zones in the table.Requests(insert, lookup,or delete)for a particular key are routed by intermediate CAN nodes towards the CAN node whose zone contains that key. Our CAN design is completely distributed(it requires no form of centralized control,coordination or configuration),scalable(nodes maintain only a small amount of control state that is independent of the number of nodes in the system),and fault-tolerant(nodes can route around failures).Unlike systems such as the DNS or IP routing,our design does not impose any form of rigid hierarchical naming structure to achieve scalability.Finally,our design can be implemented entirely at the application level.In what follows,we describe our basic design for a CAN in Sec-tion2,describe and evaluate this design in more detail in Section3 and discuss our results in Section4.We discuss related work in Section5and directions for future work in Section6.2.DESIGNFirst we describe our Content Addressable Network in its most basic form;in Section3we present additional design features that greatly improve performance and robustness.Our design centers around a virtual-dimensional Cartesian co-ordinate space on a-torus.2This coordinate space is completely logical and bears no relation to any physical coordinate system.At any point in time,the entire coordinate space is dynamically par-titioned among all the nodes in the system such that every node “owns”its individual,distinct zone within the overall space.For example,Figure1shows a2-dimensional coordinate space partitioned between5CAN nodes.This virtual coordinate space is used to store(key,value)pairs as follows:to store a pair(,),key is deterministically mapped onto a point in the coordinate space using a uniform hash function.The corresponding(key,value)pair is then stored at the node that owns the zone within which the point lies.To retrieve an entry corresponding to key,any node can apply the same deterministic hash function to map onto point and then retrieve the corresponding value from the point.If the pointis not owned by the requesting node or its immediate neighbors, the request must be routed through the CAN infrastructure until it reaches the node in whose zone lies.Efficient routing is therefore a critical aspect of a CAN.Nodes in the CAN self-organize into an overlay network that rep-resents this virtual coordinate space.A node learns and maintains the IP addresses of those nodes that hold coordinate zones adjoin-ing its own zone.This set of immediate neighbors in the coordinate space serves as a coordinate routing table that enables routing be-tween arbitrary points in this space.We will describe the three most basic pieces of our design:CAN routing,construction of the CAN coordinate overlay,and mainte-nance of the CAN overlay.2.1Routing in a CANFor simplicity,the illustrations in this paper do not show a torus, so the reader must remember that the coordinate space wraps.Intuitively,routing in a Content Addressable Network works by following the straight line path through the Cartesian space from source to destination coordinates.A CAN node maintains a coordinate routing table that holds the IP address and virtual coordinate zone of each of its immediate neighbors in the coordinate space.In a-dimensional coordinate space,two nodes are neighbors if their coordinate spans overlap along dimensions and abut along one dimension.For example, in Figure2,node5is a neighbor of node1because its coordinate zone overlaps with1’s along the Y axis and abuts along the X-axis. On the other hand,node6is not a neighbor of1because their co-ordinate zones abut along both the X and Y axes.This purely local neighbor state is sufficient to route between two arbitrary points in the space:A CAN message includes the destination coordinates. Using its neighbor coordinate set,a node routes a message towards its destination by simple greedy forwarding to the neighbor with coordinates closest to the destination coordinates.Figure2shows a sample routing path.For a dimensional space partitioned into equal zones,the av-erage routing path length is hops and individual nodes maintain neighbors3.These scaling results mean that for a-dimensional space,we can grow the number of nodes(and hence zones)without increasing per node state while the average path length grows as.Note that many different paths exist between two points in the space and so,even if one or more of a node’s neighbors were to crash,a node can automatically route along the next best available path.If however,a node loses all its neighbors in a certain direction, and the repair mechanisms described in Section2.3have not yet rebuilt the void in the coordinate space,then greedy forwarding may temporarily fail.In this case,a node may use an expanding ring search(using stateless,controlledflooding over the unicast CAN overlay mesh)to locate a node that is closer to the destination than itself.The message is then forwarded to this closer node,from which greedy forwarding is resumed.2.2CAN constructionAs described above,the entire CAN space is divided amongst the nodes currently in the system.To allow the CAN to grow in-crementally,a new node that joins the system must be allocated its own portion of the coordinate space.This is done by an existing node splitting its allocated zone in half,retaining half and handing the other half to the new node.The process takes three steps:1.First the new node mustfind a node already in the CAN.2.Next,using the CAN routing mechanisms,it mustfind a nodewhose zone will be split.3.Finally,the neighbors of the split zone must be notified sothat routing can include the new node.BootstrapA new CAN nodefirst discovers the IP address of any node cur-rently in the system.The functioning of a CAN does not depend Recently proposed routing algorithms for location services[15, 20]route in hops with each node maintaining neighbors.Notice that were we to select the number of dimensions d=,we could achieve the same scaling properties.We choose to hold dfixed independent of n,since we envision apply-ing CANs to very large systems with frequent topology changes. In such systems,it is important to keep the number of neighbors independent of the system sizeFigure 1:Example 2-d space with 5nodes7’s coordinate neighbor set = { }152364(x,y)sample routing path from node 1 to point (x,y)1’s coordinate neighbor set = {2,3,4,5} Figure 2:Example 2-d space before node 7joins7523461’s coordinate neighbor set = {2,3,4,7} 7’s coordinate neighbor set = {1,2,4,5}1Figure 3:Example 2-d space after node 7joinson the details of how this is done,but we use the same bootstrap mechanism as YOID [4].As in [4]we assume that a CAN has an associated DNS domain name,and that this resolves to the IP address of one or more CAN bootstrap nodes.A bootstrap node maintains a partial list of CAN nodes it believes are currently in the system.Simple techniques to keep this list reasonably current are described in [4].To join a CAN,a new node looks up the CAN domain name in DNS to retrieve a bootstrap node’s IP address.The bootstrap node then supplies the IP addresses of several randomly chosen nodes currently in the system.Finding a ZoneThe new node then randomly chooses a point in the space and sends a JOIN request destined for point .This message is sent into the CAN via any existing CAN node.Each CAN node then uses the CAN routing mechanism to forward the message,until it reaches the node in whose zone lies.This current occupant node then splits its zone in half and assigns one half to the new node.The split is done by assuming a certain ordering of the dimensions in deciding along which dimension a zone is to be split,so that zones can be re-merged when nodes leave.For a 2-d space a zone would first be split along the X dimension,then the Y and so on.The (key,value)pairs from the half zone to be handed over are also transfered to the new node.Joining the RoutingHaving obtained its zone,the new node learns the IP addresses of its coordinate neighbor set from the previous occupant.This set is a subset of the previous occupant’s neighbors,plus that occupant itself.Similarly,the previous occupant updates its neighbor set to eliminate those nodes that are no longer neighbors.Finally,both the new and old nodes’neighbors must be informed of this realloca-tion of space.Every node in the system sends an immediate update message,followed by periodic refreshes,with its currently assigned zone to all its neighbors.These soft-state style updates ensure that all of their neighbors will quickly learn about the change and will update their own neighbor sets accordingly.Figures 2and 3show an example of a new node (node 7)joining a 2-dimensional CAN.The addition of a new node affects only a small number of ex-isting nodes in a very small locality of the coordinate space.The number of neighbors a node maintains depends only on the dimen-sionality of the coordinate space and is independent of the totalnumber of nodes in the system.Thus,node insertion affects only O(number of dimensions)existing nodes,which is important for CANs with huge numbers of nodes.2.3Node departure,recovery and CAN main-tenanceWhen nodes leave a CAN,we need to ensure that the zones they occupied are taken over by the remaining nodes.The normal pro-cedure for doing this is for a node to explicitly hand over its zone and the associated (key,value)database to one of its neighbors.If the zone of one of the neighbors can be merged with the departing node’s zone to produce a valid single zone,then this is done.If not,then the zone is handed to the neighbor whose current zone is smallest,and that node will then temporarily handle both zones.The CAN also needs to be robust to node or network failures,where one or more nodes simply become unreachable.This is han-dled through an immediate takeover algorithm that ensures one of the failed node’s neighbors takes over the zone.However in this case the (key,value)pairs held by the departing node are lost until the state is refreshed by the holders of the data 4.Under normal conditions a node sends periodic update messages to each of its neighbors giving its zone coordinates and a list of its neighbors and their zone coordinates.The prolonged absence of an update message from a neighbor signals its failure.Once a node has decided that its neighbor has died it initiates the takeover mechanism and starts a takeover timer running.Each neighbor of the failed node will do this independently,with the timer initialized in proportion to the volume of the node’s own zone.When the timer expires,a node sends a TAKEOVER message conveying its own zone volume to all of the failed node’s neighbors.On receipt of a TAKEOVER message,a node cancels its own timer if the zone volume in the message is smaller that its own zone volume,or it replies with its own TAKEOVER message.In this way,a neighboring node is efficiently chosen that is still alive and has a small zone volume 5.Under certain failure scenarios involving the simultaneous fail-ure of multiple adjacent nodes,it is possible that a node detects To prevent stale entries as well as to refresh lost entries,nodes that insert (key,value)pairs into the CAN periodically refresh these entriesAdditional metrics such as load or the quality of connectivity can also be taken into account,but in the interests of simplicity we won’t discuss these further here.a failure,but less than half of the failed node’s neighbors are still reachable.If the node takes over another zone under these circum-stances,it is possible for the CAN state to become inconsistent.Insuch cases,prior to triggering the repair mechanism,the node per-forms an expanding ring search for any nodes residing beyond thefailure region and hence it eventually rebuilds sufficient neighborstate to initiate a takeover safely.Finally,both the normal leaving procedure and the immediatetakeover algorithm can result in a node holding more than onezone.To prevent repeated further fragmentation of the space,abackground zone-reassignment algorithm,which we describe inAppendix A,runs to ensure that the CAN tends back towards onezone per node.3.DESIGN IMPROVEMENTSOur basic CAN algorithm as described in the previous sectionprovides a balance between low per-node state(for a -dimensional space)and short path lengths with hops for dimensions and nodes.This bound applies to the numberof hops in the CAN path.These are application level hops,not IP-level hops,and the latency of each hop might be substantial;recall that nodes that are adjacent in the CAN might be many miles and many IP hops away from each other.The average total latency of a lookup is the average number of CAN hops times the average la-tency of each CAN hop.We would like to achieve a lookup latency that is comparable within a small factor to the underlying IP path latencies between the requester and the CAN node holding the key. In this section,we describe a number of design techniques whose primary goal is to reduce the latency of CAN routing.Not unin-tentionally,many of these techniques offer the additional advan-tage of improved CAN robustness both in terms of routing and data availability.In a nutshell,our strategy in attempting to reduce path latency is to reduce either the path length or the per-CAN-hop la-tency.Afinal improvement we make to our basic design is to add simple load balancing mechanisms(described in Sections3.7and 3.8).First,we describe and evaluate each design feature individually and then,in Section4,discuss how together they affect the overall performance.These added features yield significant improvements but come at the cost of increased per-node state(although per-node state still remains independent of the number of nodes in the sys-tem)and somewhat increased complexity.The extent to which the following techniques are applied(if at all)involves a trade-off be-tween improved routing performance and system robustness on the one hand and increased per-node state and system complexity on the other.Until we have greater deployment experience,and know the application requirements better,we are not prepared to decide on these tradeoffs.We simulated our CAN design on Transit-Stub(TS)topologiesusing the GT-ITM topology generator[22].TS topologies modelnetworks using a2-level hierarchy of routing domains with transitdomains that interconnect lower level stub domains.3.1Multi-dimensioned coordinate spacesThefirst observation is that our design does not restrict the di-mensionality of the coordinate space.Increasing the dimensions of the CAN coordinate space reduces the routing path length,and hence the path latency,for a small increase in the size of the coor-dinate routing table.Figure4measures this effect of increasing dimensions on rout-ing path length.We plot the path length for increasing numbers ofCAN nodes for coordinate spaces with different dimensions.For a system with nodes and dimensions,we see that the path length scales as in keeping with the analytical results for per-fectly partitioned coordinate spaces.Because increasing the number of dimensions implies that a node has more neighbors,the routing fault tolerance also improves as a node now has more potential next hop nodes along which messages can be routed in the event that one or more neighboring nodes crash.3.2Realities:multiple coordinate spacesThe second observation is that we can maintain multiple,inde-pendent coordinate spaces with each node in the system being as-signed a different zone in each coordinate space.We call each such coordinate space a“reality”.Hence,for a CAN with realities,a single node is assigned coordinate zones,one on every reality and holds independent neighbor sets.The contents of the hash table are replicated on every reality. This replication improves data availability.For example,say a pointer to a particularfile is to be stored at the coordinate loca-tion(x,y,z).With four independent realities,this pointer would be stored at four different nodes corresponding to the coordinates (x,y,z)on each reality and hence it is unavailable only when all four nodes are unavailable.Multiple realities also improve rout-ing fault tolerance,because in the case of a routing breakdown on one reality,messages can continue to be routed using the remaining realities.Further,because the contents of the hash table are replicated on every reality,routing to location(x,y,z)translates to reaching(x,y,z) on any reality.A given node owns one zone per reality each of which is at a distinct,and possibly distant,location in the coordi-nate space.Thus,an individual node has the ability to reach distant portions of the coordinate space in a single hop,thereby greatly re-ducing the average path length.To forward a message,a node now checks all its neighbors on each reality and forwards the message to that neighbor with coordinates closest to the destination.Figure5 plots the path length for increasing numbers of nodes for different numbers of realities.From the graph,we see that realities greatly reduce path length.Thus,using multiple realities reduces the path length and hence the overall CAN path latency.Multiple dimensions versus multiple realities Increasing either the number of dimensions or realities results in shorter path lengths,but higher per-node neighbor state and main-tenance traffic.Here we compare the relative improvements caused by each of these features.Figure6plots the path length versus the average number of neigh-bors maintained per node for increasing dimensions and realities. We see that for the same number of neighbors,increasing the di-mensions of the space yields shorter path lengths than increasing the number of realities.One should not,however,conclude from these tests that multiple dimensions are more valuable than multi-ple realities because multiple realities offer other benefits such as improved data availability and fault-tolerance.Rather,the point to take away is that if one were willing to incur an increase in the av-erage per-node neighbor state for the primary purpose of improving routing efficiency,then the right way to do so would be to increase the dimensionality of the coordinate space rather than the number of realities.3.3Better CAN routing metricsThe routing metric,as described in Section2.1,is the progress in terms of Cartesian distance made towards the destination.One can improve this metric to better reflect the underlying IP topology by having each node measure the network-level round-trip-time RTT to each of its neighbors.For a given destination,a message481632641282562561024409616K 64K 256K1MN u m b e r o f h o p sNumber of nodes#realities=12 dimensions3 dimensions4 dimensions5 dimensionsFigure 4:Effect of dimensions on path length 2481632641282562561024409616K 64K 256K1MN u m b e r o f h o p sNumber of nodes#dimensions=21 reality2 realities3 realities4 realitiesFigure 5:Effect of multiple realities on path length 10152025N u m b e r o f h o p sNumber of neighborsNumber of nodes = 131,072Figure 6:Path length with increasing neighbor stateis forwarded to the neighbor with the maximum ratio of progress to RTT.This favors lower latency paths,and helps the application level CAN routing avoid unnecessarily long hops.Unlike increasing the number of dimensions or realities,RTT-weighted routing aims at reducing the latency of individual hops along the path and not at reducing the path length.Thus,our metric for evaluating the efficacy of RTT-weighted routing is the per-hop latency,obtained by dividing the overall path latency by the path length.To quantify the effect of this routing metric,we used Transit-Stub topologies with link latencies of 100ms for intra-transit do-main links,10ms for stub-transit links and 1ms for intra-stub do-main links.With our simulated topology,the average end-to-end la-tency of the underlying IP network path between randomly selected source-destination nodes is approximately 115ms.Table 1com-pares the average per-hop latency with and without RTT weighting.These latencies were averaged over test runs with ,the number of nodes in the CAN,ranging from to .As can be seen,while the per-hop latency without RTT-weighted routing matches the underlying average IP network latency,RTT-weighted routing lowers the per-hop latency by between 24%and 40%depending on the number of dimensions.Higher dimensions give more next-hop forwarding choices and hence even greater im-provements.3.4Overloading coordinate zonesSo far,our design assumes that a zone is,at any point in time,assigned to a single node in the system.We now modify this to allow multiple nodes to share the same zone.Nodes that share the same zone are termed peers.We define a system parameter MAXPEERS ,which is the maximum number of allowable peers per zone (we imagine that this value would typically be rather low,3or 4for example).With zone overloading,a node maintains a list of its peers in ad-dition to its neighbor list.While a node must know all the peers in its own zone,it need not track all the peers in its neighboring zones.Rather,a node selects one neighbor from amongst the peers in each of its neighboring zones.Thus,zone overloading does not increase the amount of neighbor information an individual node must hold,but does require it to hold additional state for up to MAXPEERS peer nodes.Overloading a zone is achieved as follows:When a new node joins the system,it discovers,as before,an existent node whose zone it is meant to occupy.Rather than directly splitting its zoneas described earlier,node first checks whether it has fewer than MAXPEERS peer nodes.If so,the new node merely joins ’s zone without any space splitting.Node obtains both its peer list and its list of coordinate neighbors from .Periodic soft-state updates from serve to inform ’s peers and neighbors about its entry into the system.If the zone is full (already has MAXPEERS nodes),then the zone is split into half as before.Node informs each of the nodes on it’s peer-list that the space is to be ing a deterministic rule (for example the ordering of IP addresses),the nodes on the peer list together with the new node divide themselves equally between the two halves of the now split zone.As before,obtains its initial list of peers and neighbors from .Periodically,a node sends its coordinate neighbor a request for its list of peers,then measures the RTT to all the nodes in that neighboring zone and retains the node with the lowest RTT as its neighbor in that zone.Thus a node will,over time,measure the round-trip-time to all the nodes in each neighboring zone and retain the closest (i.e.lowest latency)nodes in its coordinate neighbor set.After its initial bootstrap into the system,a node can perform this RTT measurement operation at very infrequent intervals so as to not unnecessarily generate large amounts of control traffic.The contents of the hash table itself may be either divided or replicated across the nodes in a zone.Replication provides higher availability but increases the size of the data stored at every node by a factor of MAXPEERS (because the overall space is now partitioned into fewer,and hence larger,zones)and data consistency must be maintained across peer nodes.On the other hand,partitioning data among a set of peer nodes does not require consistency mechanisms or increased data storage but does not improve availability either.Overloading zones offers many advantages:reduced path length (number of hops),and hence reduced path latency,because placing multiple nodes per zone has the same effect as reducing the number of nodes in the system.reduced per-hop latency because a node now has multiple choices in its selection of neighboring nodes and can select neighbors that are closer in terms of latency.Table 2lists the average per-hop latency for increasing MAXPEERS for system sizes ranging from to nodes with the same Transit-Stub simulation topologies as in Section 3.3.We see that placing 4nodes per zone can reduce the per-hop latency by about 45%.improved fault tolerance because a zone is vacant only when。